Slide 28
Slide 28 text
EXPLOITABILITY: What is needed to
exploit this threat?
0 = Advanced programming and networking
knowledge, with custom or advanced tool.
5 = Malware exists on the Internet, or an exploit
is easily performed, using available attack tools.
10 = Just a web browser