Just as technology quickly changes…so do the security threats. As you develop new security mechanisms, you need to be aware of the top identified security threats that exist.
Search the internet for the list of top 10 cyber security threats in the current year or the previous year.
Using the internet, research three security threats using credible sources (scholarly journals and articles) found in the ECPI Online Library. In a two- to three-page MS Word document, address the following:
- Identify and describe the three security threats you selected.
- Describe how the threat manifests itself?
- What security mechanism would you use to mitigate each threat?
- Format your paper using APA guidelines.
Include your summary in a Microsoft Word document named Lastname_Wk4_Research.doc.