Address one of the topics below:
- Describe an effective software development policy and provide an example.
- Describe what the overall goal of protecting confidentiality is.
- Outline some threats to a software environment.
- Constrast and compare different types of malicious software.
- What are the risks of “sloppy code” to an organization?
- Briefly describe what a key logger, virus, and a worm are and provide examples.
- Ideally, who is involved in designing and maintaining a secure organizational environment?