Question Description
I’m working on a Computer Science report and need a sample draft to help me learn.
Threats to applications or software require mitigation. Mitigation can be accomplished in four ways: redesign to eliminate vulnerability, apply a standard mitigation, invent a new mitigation, or accept the vulnerability.
Deliverables:
For this assignment, you are to:
1) Compare and contrast each of the four mitigation options,
2) Highlighting the advantages and disadvantages of each.
3) Additionally, indicate where in the SDLC process mitigation techniques should be applied for maximum effectiveness.
Report should be 4-5 pages in length, not including the title or reference pages.
Use writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings, use in-text citation.
plagiarism percentage < 20% .