04 Apr Discuss the differences between software and hardware vulnerabilities. What threats would likely exploit these vulnerabilities?
Discuss the differences between software and hardware vulnerabilities. What threats would likely exploit these vulnerabilities? What impact might these vulnerabilities have on a business, and how might they be prevented or mitigated through risk management?
Minimum of 200 words:
