Work has to be original, no plagiarism. Need two
paragraphs.
Discuss vulnerabilities that can be encountered
by information systems and processes that can be used to overcome them. Support
with examples.