Part 1 Google’s Privacy
Part 2Vulnerability Assessment
After watching the two videos on Vulnerability Assessment,
http://www.youtube.com/watch?v=GqhdQ6I6dMA, how can you use this methodology to combat risk? Describe a situation where you would use it and why? What challenges would you face in using it?