Task1:words:300
defining and discussing cloud application security. Compare and contrast it with other types of application security.
Task2:words:300
Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?
Task3:words:300
describe a hacking tool that is used to gain access to a network. Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network.
0 comments