Take a look at popular news sources for stories related to computer vulnerabilities. Then research the vulnerabilities that you read about to see if there are any inconsistencies between the way the press reports them and the way researchers have documented them.
Some sources to consider: The Hacker News, Vendor websites that post vulnerabilities,https://www.us-cert.gov/ncas/alerts
The summary should be no longer than one page, double spaced, font size 12. Construct the paper in the means of having an opening topic sentence and intro paragraph followed by your body paragraphs and then close with a summary paragraph that reiterates the topic of your paper. Use APA style for any citations.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here