Define the following key terms from this chapter, and check your answers in the glossary:
asset
BYOD
brute-force (password-guessing) attacks
CERT
RDDoS
risk
threat
Traffic Light Protocol (TLP)
vulnerability