threats
por istm gwu
1. vandalism
2. cyberstalking
3. embezzlement
3.1. New node
4. physical harm
4.1. New node
5. CIA model
5.1. Confidentiality
5.1.1. access is avail only to authorized users
5.1.1.1. who defines authorized