Write 2 paper in which you do the following-
Explain to the organization the potential threats in their software environments.
Describe the various protection efforts available against each threat.
Include three different example sets, each with a vulnerability and a way to mitigate (control) that item.