Possible attacks and how to mitigate it