determining the feasibility and the potential consequences of a successful attack
detecting potential weaknesses in systemsAnswer:
Step-by-step explanation:
6.6m questions
8.8m answers