Discuss the differences between software and hardware vulnerabilities. What threats would likely exploit these vulnerabilities? What impact might these vulnerabilities have on a business, and how might they be prevented or mitigated through risk management?
Minimum of 200 words: