Address one of the topics below:
• Describe an effective software development policy and provide an example.
• Describe what the overall goal of protecting confidentiality is.
• Outline some threats to a software environment.
• Constrast and compare different types of malicious software.
• What are the risks of "sloppy code" to an organization?
• Briefly describe what a key logger, virus, and a worm are and provide examples.
• Ideally, who is involved in designing and maintaining a secure organizational environment?