• Exploiting vulnerabilities to gain system access
  • Malware threats and countermeasures