compare different threats and vulnerabilities

individually, the different kinds of data breaches, the threats and vulnerabilities that lead to the breaches, and the severity of each.

 

Choose any format to present. Some guidelines are:

  • APA formatted paper (2 to 3 pages)
  • Scripted demonstration (15 to 20 minutes)
  • Other formats as approved by your facilitator