of the most commonly used methods to illegally access network assets and business and personal data.
Prepare and submit a 8- to 10 slide Microsoft PowerPoint presentation that outlines the most common threats and methods of prevention of threats. One slide should include definitions from authoritative sources on the terms "threat", "vulnerability", "exploit", and "risk".
Include information on hardware and software platforms and how their vulnerabilities add to the problem. Include a graphic, table, or appropriate image on each slide. Do NOT use clip art or cartoons. The graphic, table, or image must be related to the slide and if taken from a source must be properly referenced.
Provide speaker notes to explain bullet points.
Use a minimum of two outside academic references in addition to use of course texts and websites.
Format your citations and references consistent with APA guidelines.
Questions & Answers
Have a Question?
Be the first to ask a question about this.