Discussion 1
Describe the best practice to employ to mitigate malware effects on a machine.
300 words, and include references. apa format
Discussion 2
Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups.
How does Web 2.0 change security for the Internet?
How do secure software development concepts support protecting applications?
300 words, and include references. apa format
Discussion 3
subject: Information Systems Security
question) Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well?
300 words, and include references. apa format