Discussion Question
Pick one of the 22, MIT 6.858 Computer Systems Security, Fall 2014 videos and create your own thread discussing at least three concepts presented in or that you learned from the video. As a note, each student must chose a different video (you cannot use a previously discussed video) for this discussion board.
https://www.youtube.com/playlist?list=PLUl4u3cNGP6…
Paper should be minimum two pages without reference page. please make sure there is no plagarism and do not spin the words.
Solution Preview
Privacy vulnerabilities are regularly reported by media and research whereby sensitive data leaks to the public domain. Most of these incidences occur as a result of data being exfiltrated maliciously by specific malware. Leaks in most cases do not happen because of malicious intent by the application’s author but rather as a result of misconfiguration of these particular applications or side effects that are unexpected.
(581 words)