-thread actors exploit vulnerabilites to launch attacks
-attacks lead to compromises or security breaches
-vulnerabilites can be found in software, networks, and humans
Cofidentiality, Integrity, Availability -> CIA
what should the good guys do?
prevention, detection, response, recovery and remediation
policy vs. mechanism