Discuss the relation between vulnerabilities, impacts, threats, and risks. Give an example.
What is the first question that should be asked when protecting assets from a cyberattack?
Discuss one of the Threat Modeling Methodologies discussed in this week’s reading.
Give a question/comment on the CySA+ certification and its validity in the industry.