The ???modeling??? capability can provide various advantages such as allowing a user to set various properties to more accurately reflect the network or environment, the profile of the attacker, including their system resources and network environment, and/or allowing a user to model ???what-if??? scenarios.