From the first e-Activity, analyze the selected two
Question # 00204294
Posted By:
Updated on: 02/23/2016 12:25 PM Due on: 02/22/2016

1. From the first e-Activity, analyze the selected two (2) resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these resources are helpful for security professionals.
E-Activity - Research the Internet or Strayer Library for resources that security professionals can use in order to find information about threats and / or malware active today. Be prepared to discuss.
2. From the second e-Activity, explain whether or not you believe that the myth of Mac devices being more secure than Windows devices is becoming history, and justify your answer. Further, indicate one (1) main reason why you believe this myth still exists in the minds of end users and businesses.
E-Activity - http://www.computerworld.com/article/2474534/malware-vulnerabilities/does-the-latest-mac-malware-attack-show-that-windows-8-is-more-secure-than-m.html
E-Activity - Research the Internet or Strayer Library for resources that security professionals can use in order to find information about threats and / or malware active today. Be prepared to discuss.
2. From the second e-Activity, explain whether or not you believe that the myth of Mac devices being more secure than Windows devices is becoming history, and justify your answer. Further, indicate one (1) main reason why you believe this myth still exists in the minds of end users and businesses.
E-Activity - http://www.computerworld.com/article/2474534/malware-vulnerabilities/does-the-latest-mac-malware-attack-show-that-windows-8-is-more-secure-than-m.html

-
Rating:
5/
Solution: From the first e-Activity, analyze the selected two