methods, and data
items to consider for each entity, which is good for any specific low-complexity
entity. However, when you take into consideration the massive population of tier
1 and 2 entities, the aggregate number of attack vectors is still daunting. Even a
single attack vector for each tier two system, compared with 14 attack vectors for a
tier 3 Linux system (based on Manadhata and Wing’s estimate), still results in tier 2
systems presenting over 42% more attack vectors in aggregate than tier 3 systems.