important be able to explain various types of vulnerabilities, for hardware, this includes: firmware end-of-life legacy