The University of SydneyPage 25Vulnerabilities and ThreatsComputing resourceType of Typical VulnerabilitiesHardwareDestruction; Interception; InterruptionSoftwareModification; Interception; InterruptionDataDestruction; Interception; Interruption; Fabrication; Modification; Disclosure