From the first e-Activity, analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these resources are helpful for security professionals. E-Activity - Research the Internet or Strayer Library for resources that security professionals can use in order to find information about threats and / or malware active today.
Be prepared to discuss. From the second e-Activity, explain whether or not you believe that the myth of Mac devices being more secure than Windows devices is becoming history, and justify your answer. Further, indicate one (1) main reason why you believe this myth still exists in the minds of end users and businesses. E-Activity - http://www.computerworld.com/article/2474534/malware-vulnerabilities/does-the-latest-mac-malware-attack-show-that-windows-8-is-more-secure-than-m.html List four distinct tasks that a software engineer must perform in a typical software development project. Then, determine whether or not you believe the best programmers make the best software engineers. Provide a rationale for your answer.
Present an argument as to whether you believe the intangibility of software systems poses a special problem for software project management. Support your response with two examples. Identify some of the risks in the context of people, organizations, tools, requirements, and estimations that could arise in software projects. Describe ways to mitigate each risk. From the e-Activity, use a real-world scenario to describe a contingency plan for addressing at least one type of risk that has come to fruition from an ethical lapse.
Get Free Quote!
375 Experts Online