determining the feasibility and the potential consequences of a successful attack
detecting potential weaknesses in systemsAnswer:
Step-by-step explanation:
8.7m questions
11.3m answers