Organizations continue to be challenged with an increased cyber vulnerabilities and threats. Vulnerabilities can exist anywhere in the Internet system. Some of these could be related to software,
a system weakness, or simply brought on in many ways to include hackers, employee errors, or as a result of a disaster.
Discuss the types of cyber vulnerabilities and threats for Internet technology (IT) systems (i.e., hardware, software, stored data, and human).