Discuss the differences between software and hardware vulnerabilities. What threats would likely exploit these vulnerabilities? What impact might these vulnerabilities have on a business, and how […]
PERSONAL “7 HATS” ASSESSMENTRead through the book’s profile of the different capabilities and attributes associated with each ‘hat’. Spend time performing a self-assessment to determine where […]