Point detail
1.
High level descriptions of threats and relating vulnerability or attack method are listed in Table A1.
a0c0