determining the feasibility and the potential consequences of a successful attack
detecting potential weaknesses in systemsAnswer:
Step-by-step explanation:
4.5m questions
5.9m answers