Choose ONE question/topic from this list:
- Describe an effective software development policy and provide an example.
- Describe what the overall goal of protecting confidentiality is.
- Outline some threats to a software environment.
- Constrast and compare different types of malicious software.
- What are the risks of "sloppy code" to an organization?
- Briefly describe what a key logger, virus, and a worm are and provide examples.
- Ideally, who is involved in designing and maintaining a secure organizational environment?
300 minimum words
Additional write two short different paragraphs/replies that either support or refute the information presented.