determining the feasibility and the potential consequences of a successful attack
detecting potential weaknesses in systemsAnswer:
Step-by-step explanation:
9.1m questions
11.8m answers