Identification should include a description of how IP vulnerabilities are exploited by threat actors.