Page 175

The University of SydneyPage 26Vulnerabilities and Threats–Types of Vulnerabilities –Modification–Destruction–Disclosure–Interception–Interruption–Fabrication