... interfaces• Data and information • People• System missionStep 1. System CharacterizationLikelihood RatingStep 5. Likelihood Determination• Threat-source motivation • Threat capacity• Nature ... interfaces• Data and information • People• System missionStep 1. System CharacterizationLikelihood RatingStep 5. Likelihood Determination• Threat-source motivation • Threat capacity• Nature ... systematically evaluate and identify the vulnerabilities of the assets (personnel, hardware, software, information) , nonautomated procedures, processes, and information transfers associated...