Discussion Post
• How to hack cryptocurrencies and block chain systems? What are the biggest weakness in those systems?
• Cloud security: Describe cloud security challenges and recent hacks and security controls to protect cloud environment
• Future of cybersecurity: Describe future of cybersecurity, what to expect in 5 year.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.