Chapter 6 Comparing Threats, Vulnerabilities, and Common Attacks You must be logged in to view this content.