Step 2: Identify Examples of Vulnerabilities, Threats, andRisksIn the previous step, you familiarized yourself with the concepts ofvulnerability, threat, and risk. You now understand their relationship toone another and how they relate to security. In this step, you are goingto identify at least two examples of a vulnerability, two examples of athreat, and two examples of a risk in each of the following categories:? technology? people (human factors)? policyIdentify a minimum of 18 examples. This will assist you in conductingthe vulnerability assessment and developing the educational brochure.Review topics such as basic elements of communication and computernetworks.In the next step, you will look more closely at current vulnerabilities andthreats.Step 3: Identify Current Vulnerabilities and ThreatsAfter defining and identifying examples of vulnerabilities, threats, andrisks in the first two steps, you should understand the basic concepts ofvulnerabilities and threats as they apply to general cybersecurity.However, vulnerabilities and threats are dynamic: They can evolve withchanges in technologies, changes in adversary capabilities orintentions, or changes in human behaviors and organizational policies.It is important to understand current vulnerabilities and threats andtheir applicability to the larger community as well as to yourorganization (e.g., critical infrastructure protection), so that you canmake informed recommendations on how/whether to mitigate them.Identify current known vulnerabilities and threats that could affect yourorganization. The vulnerabilities and threats that you identify will benecessary for your final presentation.List a minimum of two current known vulnerabilities and threatsinvolving the following:? people (human factors)? technology? policyWhen complete, move to the next step, where you will take part in asimulation.