OverviewLearning Objectives22.1 Situation Understanding Interplay with Command and Control22.2 Situation-Based Decision Making: The OODA Loop22.3 Grasping the Nature of the Attack22.3.1 What Vulnerability Is It Exploiting?22.3.2 Which Paths Are the Attacks Using?22.3.3 Are the Attack Paths Still Open?22.3.4 How Can the Infiltration, Exfiltration, and Propagation Paths Be Closed?22.4 The Implication to Mission22.4.1 Increased Risk22.4.2 Contingency Planning22.4.3 Nature and Locus Guiding Defense22.5 Assessing Attack Damages22.6 Threat Assessment22.7 The State of Defenses22.7.1 Health, Stress, and Duress22.7.2 Status22.7.3 Configuration Maneuverability22.7.4 Progress and Failure22.8 Dynamic Defense EffectivenessConclusionQuestions