Step 3: Analyze Potential Threats and Adversaries