Slide 1 Lecture 1 Overview Slide 2 Computer-Based System Hardware Software Data Vulnerability – Weakness (to be exploited) Threat – Circumstances (Potential to cause…