Describes vulnerabilities related to the failure to harden networks and network operating systems, including the use of supporting examples
Describes specific adversaries and motivations to threaten enterprise information assets, including the use of supporting examples.