The relation between vulnerabilities, impacts, threats, and risks

Discuss the relation between vulnerabilities, impacts, threats, and risks. Give an example. What is the first question that should be asked when protecting assets from a cyberattack? Discuss one of the Threat Modeling Methodologies discussed in this week’s reading. Give a question/comment on the CySA+ certification and its validity in the industry.