Discussion: "Central Repository and Threat Modeling"
Respond to the following:
•	From the e-Activity, provide three examples of unintentional security threats and three examples of intentional security threats. Determine which of these examples puts an organization at a higher risk and explain why.
•	Propose three advantages and three disadvantages of using a central repository. Determine which advantages are the most important to an organization and which disadvantage is the most limiting to an organization.
The response should include a reference list.  Double-space, using Times   New Roman 12 pnt font, one-inch margins, and APA style of writing and   citations.