Discussion 1: (300 words)
Describe the benefits and limitations of creating an attack tree.
Discussion 2: (200 words)
Describe a well-known example or personal experience of unauthorized information disclosure (Do not include specific names of organizations or people).
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.