Identifying Potential Malicious Attacks, Threats and Vulnerabilities custom essay