Understanding Threat Protection in Identity Security