please explain in your own words how threats are modeled and assessed in the cybersecurity world.
please explain the vulnerabilities of applications and how they are mitigated.
please characterize the risks involved in Mobile and Internet of Things (IOT) devices.