0 Comments
Answer:
All threats can be decomposed into two basic elements:
(1) a trigger
(2) one or more vulnerabilities.