Identification should include
network map analysis
threat map analysis.