20-CS-5156 Security Vulnerability Assessment Spring 2017
Final Exam

Authentication, Availability, Confidentiality, Integrity, Defense Principles, Intrusion Detection, Attack vectors, more

 
Review Research Articles on Security Vulnerabilities

Review two of the following articles relating to security vulnerabilities. Write a roughly 800 word (≈ 1.5 pages at 12pt font with 2.5 cm margins) analysis of the content, including what the significant findings are, what ramifications (if any) it may have in today's environment. If the article describes mitigations or other conclusions, include a summary of those as well. Some articles aren't for vulnerabilities, but rather for systems or solutions to vulnerability problems. In those cases, describe how the documented solution or process will help mitigate or manage vulnerabilities or cyber security in general, resulting in a more secure environment.