Explain the cybersecurity vulnerabilities of applications and how they are mitigated.

1. I please explain in your own words how threats are modeled and assessed in the cybersecurity world. 
2. please explain the cybersecurity vulnerabilities of applications and how they are mitigated.
3. Iplease characterize the cybersecurity risks involved in Mobile and Internet of Things (IOT) devices. 
Requirement?
Make sure to include at least one outside sources to support your discussion,