Introduction

Tools for identifying and using available security knowledge to mitigate and manage potential adversary actions.