Q1.Provide two examples of information security that exemplify how a vulnerability be converted into an attack. What label would give to the entity that performs these transformations?
Q2.In relation to project management tools, discuss and provide two examples or scenarios to illustrate how the work breakdown structure would identify and plan an information security problem or issue in the organisation