Previous Lecture Complete and continue  

  1.4 Types of Security Vulnerabilities