reverse engineering vs exploit development vs application security? [closed]

Using a Venn diagram, what relationship does reverse engineering, exploit development, and application security have with each other? I would like to make a Venn diagram for this topic, but I cannot find the right words to place in

Continue reading reverse engineering vs exploit development vs application security? [closed]