Attack considerations