Analysis could include, but not be limited to, areas and types of threats related to
- physical facilities
- toys
- unmanned systems
- infrastructure
- cloud computing
- mobile devices
- automobile hacking
- chip technology
- phishing attacks
- denial of service (DOS)
- distributed denial of service (DDOS)
- malware (e.g., virus, worm, botnet, ransomware)
- medical devices
- state-sponsored hacking.