Identifying assets threats and attacks