It’s a Dangerous World


Discuss the differences between software and hardware vulnerabilities. What threats would likely exploit these vulnerabilities? What impact might these vulnerabilities have on a business, and how might they be prevented or mitigated through risk management? 

Minimum of 200 words: