The University of Sydney Page 171. Which of the following is NOT one of the six types of vulnerabilities in computer systems?1. Destruction2. Disclosure3. Interception4. Corruption
From the lecture slides W2: