6.

Mitigations for "Potential vulnerabilities that could be exploited if not sufficiently protected or hardened"
Mitigations to the threats which are related to "Potential vulnerabilities that could be exploited if not sufficiently protected or hardened" are listed in Table B6.

a0c0