7. Attack Analysis