Discussion Post
• How do exploits relate to vulnerabilities?
• Using the Internet, find and read the SANS/FBI Top 20 Vulnerabilities. Discuss at least 2 of the Top 20. Discuss the threat group, category and potential risks and steps to mitigate the vulnerability.
• Jailbreaking your iPhone - is it ethical and/or legal?
The response must include a reference list. Using one-inch margins, double-space, Times New Roman 12 pnt font and APA style of writing and citations.