Discussion
1. Name a minimum of two applications used in your organization for day to day business operation, and what step does your organization take to harden them to avert security breach?
2. What are the causes of a security breach in an application?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.