4.1 Threat exposure

The operating system of a computer is exposed to many exploit vectors. Essentially, almost every means to bring in data can potentially be a threat. This subsection takes a look at these exposures.