According to the text, history can be used for both general and specific threats. Once the threat level has been assessed, vulnerability of the target must be considered.