Answer:
All threats can be decomposed into two basic elements:
(1) a trigger
(2) one or more vulnerabilities.
8.6m questions
11.3m answers