Southern New Hampshire University Software Security Discussion – Description
For your initial post:
First, introduce yourself to the class. Include your major and anything you would like to share about yourself.
Then address the prompt below.
Read one of the recommended articles that interests you from the list provided. Note: You may find other relevant articles. You are encouraged to share one in this discussion. Remember to include all the same information in your initial post as outlined below.
Microsoft Azure Flaws Could Have Let Hackers Take Over Cloud Servers (January 2020)
2 Million IoT Devices Vulnerable to Complete Takeover (April 2019)
GAO Raises Concerns About Power Grid Vulnerabilities (September 2019)
The 10 Biggest Healthcare Data Breaches of 2019, So Far (July 2019)
Read the article on a recent software security attack. Then discuss current techniques for protecting against common software security attacks. In your initial post, include a link to the article and a summary that addresses the following:
What organization did this attack happen to?
What industry was this attack in?
When did it happen?
What are common security vulnerabilities, threats, and attacks (based on previous exploits) that this type of organization (in its industry) might experience?
For your response posts, address the following:
Find at least two peers who chose a different article from your own. Respond to their posts and discuss the following:
How might exploits be different for each organization based on its industry?
What are the nuances for their type of organization?
Why might this type of threat be relevant for their organization?
The post Southern New Hampshire University Software Security Discussion first appeared on .