Implementing a new technology

What are vulnerabilities involved in implementing a new technology?
What is the likelihood for a potential vulnerability in new technologies?
Prepare a power point presentation for the above.

Sample Solution