Threat Analysis and Detection1. Read the article : Cyber Threat Metrics – http://prod.sandia.gov/techlib/access-control.cgi/2012/122427.pdf 2.In 2-3 paragraphs, 300-500 words, summarize the article you selected, perform additional research, and provide your analysis of the threat, potential risks, and a recommendation for some indicators that could used to develop a mitigation strategy, such as a Snort rule. Properly reference, and cite in MLA.