Reference no: EM133147272
ITSecurity Report
1. Monitoring employees computer use in an organization is legal. Discuss this issue from the employers and employees' perspectives and whether you think it is ethical or necessary and how it can impact employees.
2. The OSWAP (Open Web Application Security Project) releases top 10 security flaws in most critical web applications. Find out the latest release and list the 10 top flaws and pick at least 3 of those flaws to discuss them a little further.
3. Cryptography is an ancient science that has developed enormously over the years and it is now more important than ever. What do you know about cryptography? Compare the two types of cryptography?
4. Several major computer security breaches incidents in major businesses are reported every year. Identify such an IT security incidents and discuss them in more detail such as the nature of the incident, who was affected by it, its impact, its damages and costs, what was done to avoid such incidents in the future.
5. Internet browsers are the maingateway to accessing and using the Internet. Yet, if browsers are not used carefully, they become a major source of security threats to users. Research/review the five most common browser security threats, and how to handle or secure those threats. From your research, which Internet browser is the most secure.