Consider Table 5.3: System-Level Attack Objectives. please find the attachment
Pick three attacks from the table and for each one identify the best assessment tools /controls to prevent or mitigate the impact of those attacks, support your answers with real life example.