Phase 2 is to identify Solutions three (3) types of threat to a Secure System.
- Read the article on: Computer aided threat identification, http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.712.3765
- Identify the three (3) major solution to a secure systems’ threats.
- Present your finding in a 400-words document.
- You must apply and use the basic citation styles of APA.
- Use in-text citation and list the reference of your supporting source following APA’s style and formatting.