vulnerabilities threats attacks and controls