A. Threat identification, vulnerability identification, control analysis
B. Threat
identification, response identification, mitigation identification
C. Attack profile, defense profile, loss profile
D. System profile, vulnerability identification, security determination
A