•Briefly describe how computers and humans can pose risks to infrastructure asse
•Briefly describe how computers and humans can pose risks to infrastructure assets.
•Identify two physical techniques and two cybertechniques used to attack communications infrastructure.
•Explain the implications of the risks and techniques on critical infrastructure sectors.
•Describe how humans and computers can protect against the risks and techniques.