Entire Course Link
Review the "Challenges for Fixing Vulnerabilities" activity.
Create a table comparing ten of the vulnerabilities, threats, and risks for the real world security incident discussed by the class, along with related vulnerabilities that may have contributed to the security incident.
Include the following as at least 3 of the comparisons used in the table.
Write a 175- to 350-word narrative explaining trends shown from the table.
Submit your assignment using the Assignment Files tab.