Identify available attacks --- RECORDSEPARATOR --- Characterize each attack with respect to: --- RECORDSEPARATOR --- - Cost of the attack to the adversary --- RECORDSEPARATOR --- - Access required for the attack --- RECORDSEPARATOR --- - Risk incurred by the adversary --- RECORDSEPARATOR --- - Objective(s) accomplished by the adversary --- RECORDSEPARATOR --- - Impact(s) to mission accomplished