Answer:
All threats can be decomposed into two basic elements:
(1) a trigger
(2) one or more vulnerabilities.
8.3m questions
10.9m answers