“…• Security software: SIEM systems [80], intrusion detection/prevention systems [37], [103], [107], [128], [162], [173], [174], firewalls [37], [104], [127], [128], [174], anti-virus software [37], [111], [127], vulnerability scanners [173], identity and access management [104] • Network assets: Switches [104], [173], routers [104], [128], [173], servers [104], [127], [173], hosts [104], [173], proxies [174] • Virtualization environments: Hypervisor, virtual machine introspection, cloud environments [80] • Operational technology: Sensors, actuators, PLCs • Other Software: Open-Source Big Data Analytics [80], databases [173], identity and access management [173], mailserver [174], operating systems [111], [174] • Physical security assets: Security cameras, access control • External (Threat) Intelligence: Geolocation and DNS lookup [80], open source intelligence (OSINT) [47], [129], intelligence from threat sharing platforms or other organizations [130]- [132] • People:…”