Академический Документы
Профессиональный Документы
Культура Документы
Consider the information stored on your personal computer. For each of the terms listed, find an
example and document it: threat, threat agent, vulnerability, exposure, risk, attack, and exploit.