Problem
Review the "Challenges for Fixing Vulnerabilities" Team activity.
Create a table comparing 10 of the vulnerabilities, threats, and risks for the real-world security incident discussed by the class (Verizon DBR) , along with related vulnerabilities that may have contributed to the security incident.
Include the following as at least 3 of the comparisons used in the table:
1) How was the vulnerability detected?
2) What protocol was attacked?
3) What steps were taken to resolve the vulnerability?
4) Write a 1 to 2 pages narrative explaining trends shown from the table.
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.