Understanding Your Attack Surface: The First Step in Risk-based Security Intelligence