Discuss strategies, possible threats, possible threat actors, and infrastructure as it relates to the topic for this paper. Discuss the topic in as much detail as possible and showcase what it will entail. Include a diagram of the scope of these processes.