18. Attack parameters, source and destination investigative info, attacker history, direction, global situation, etc Value, popularity, role from the assetās business owners Scan data, ports, unsafe applications, patch level, OS type TVI āFusionā