Return to Article Details Threat, vulnerability, values, and damage Download Download PDF