6.1. Identify the Threat and Attack Vectors