This attack cloud aims to represent all the steps possible in an attack tree (leaf nodes). Because there is no sense of order in an attack path, linearisation can potentially be misleading. This cloud format allows us to see which steps are involved in which attacks while still understanding the full context. Steps that are a higher potential threat are closer to the root node at the center, which creates a logical hierarchy of information. By removing duplicates, this approach could potentially also allow us to view entire attack trees as a threat landscape.