COM520 Systems Security Management
Module 5 Discussion
Threats to Applications
As you may have realized from this module’s contents, almost every application is vulnerable to attacks. Pick an application (e.g., browser, email client), explain the strongest threat for it and any existing solutions to prevent it.
Categories:
