Description
a) Describe/define the security issue b) Provide examples of the issue c) Identify ways to avoid the issue d) Identify the resources used in your research (List at least three (3) resources.