The manner, technique, or means an adversary may use in an assault on information or an information system