During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
Answer:
Advancements on communication technologies played a minor part in the rise of globalization.
Explanation:
No because u ain’t put the question up here for someone to answer