Having assessed the potential points of entry and vulnerabilities an attacker could exploit, the team plotted their data into a "heat map" of cybersecurity risk. (The researchers have steered ...