threatAnalysisTactics