Identify the threat. Exploit the weakness