Analyzing Attack Opportunities Against Information Security Practitioners