A1. This paper will search on vulnerabilities and threats to computer systems. The search process will be useful in the entire process and will make use of the Search the source CVE and find three vulnerabilities found in the CVE database related to software that is used often. From the SAP database, the report that handles vulnerability can be categorized in a way that it shows the type and the risk that is associated. The search on the Expanded ASAP Worksheet was successful and enabled me to get important information from the database. I was able to gain access Continue reading...