Compare Different Threats and Vulnerabilities
Collaborative discussion, submit, individually, the different kinds of data breaches, the threats and vulnerabilities that lead to the breaches, and the severity of each.
Choose any format to present. Some guidelines are:
• APA formatted paper (2 to 3 pages).