"Central Repository and Threat Modeling" Please respond to the following:
From the e-Activity, provide three examples of unintentional security threats and three examples of intentional security threats. Determine which of these examples puts an organization at a higher risk and explain why.
Propose three advantages and three disadvantages of using a central repository. Determine which advantages are the most important to an organization and which disadvantage is the most limiting to an organization.