Threat actors will attempt to find an attack vector on their target by mapping the attack _.
surface
infrastructure
threat
door