O'Reilly logo
  • shaikha saeed thinks this is interesting:

Identifying and Analyzing Threats, Vulnerabilities, and Exploits

Note

195 – 196 are explain threat assessments Why do need it? To find / identify the threatens, vulnerabilities, and the kind. Confidentially - Steal the data Integrity - manipulate Availability - Stop from viewing the data