Which two attributes in the visibility-driven component of the Cisco security model are needed to see all threats?