1. Describe the difference between vulnerabilities and threats.
2. What types of threats is the business (Uber company)you chose susceptible to?
3. What types of information would Uber company like to protect?
3. Which laws might they ( Uber ) be subject to?
Submissions with a Turn-it-in similarity score over 25% will not be accepted and you will need to re-accomplish the assignment or accept a zero.