Week 9 Assignment:
Describe the CIA security concepts as related to operating systems. (Confidentiality, Integrity, Authentication, Authorization, and Availability.)
From the list, describe three common methods used to exploit weaknesses in an operating systems, and describe ways to mitigate these risks. (Spoofing, deception, man in the middle, back door, Trojan Horse, rootkit, etc.)
Submit a two to three page paper in APA format.