Topics 1.4.1 Threats to computer systems, and networks 1.4.2 Identifying and preventing vulnerabilities