1.4 Types of Security Vulnerabilities