What types of information would Uber company like to protect?

Vulnerabilities and Threats1. Describe the difference between vulnerabilities and threats.2. What types of threats is the business (Uber company)you chose susceptible to?3. What types of information would Uber company like to protect?4. Which laws might they ( Uber ) be subject to?  

©2020 EssayChronicles.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.