Discussion: "Central Repository and Threat Modeling"
Respond to the following:
• From the e-Activity, provide three examples of unintentional security threats and three examples of intentional security threats. Determine which of these examples puts an organization at a higher risk and explain why.
• Propose three advantages and three disadvantages of using a central repository. Determine which advantages are the most important to an organization and which disadvantage is the most limiting to an organization.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.