Does replicating SDLC with SecSDLC work well for the many various types of threats and issues innetwork security? Why or why not?
Discussing our need for security from chapter 2, expand on types of threats you've experienced in terms of being the user, student, or employee. Then discuss security fixes that could prevent this in the future. I encourage internet research to support viewpoint of security issues or fixes.
For each bulleted item, respond to at least two of your classmates' posts whose response differs from your own. Explain why you agree or disagree with his/her responses. Be sure to respond to posts' made to your initial response.For the second bullet point, please list your reference if you use theInternet to support your viewpoints of security issues or fixes.
0 comments:
Post a Comment