Discussion:
For each of the following areas where security measures should be applied, describe at least 3 common vulnerabilities that could exist:
Network
Operating system
Applications
Do these vulnerabilities disappear over time, or will they always remain once they have been introduced into an environment?
Under what circumstances would a vulnerability disappear?
Once a vulnerability is no longer present, is the organization out of harm's way?Deliverable length 2-3 paragraphs with a source