The question has relatively simple answers and it's sometimes used in risk management discussions to explain threat models.
The question has relatively simple answers and it's sometimes used in risk management discussions to explain threat models.