Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domainsDescribe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains