threatAnalysisTechniques