Threat identification & Threat assessment
This involves identifying potential threats, such as malware, phishing attacks, and network intrusions, through the use of security tools, such as intrusion detection systems, firewalls, and antivirus software.