application security 2 discussions 1
1) Fileless Malware:
Introduce and discuss a relevant issue regarding Fileless Malware.
Please find peer-reviewed journals to write the discussion. – please utilize scholarly works instead of popular sources for references as required.
2) Security Policy Conformance
– Introduce and discuss a relevant issue regarding Security Policy Conformance.
– include at least 2 scholarly references in APA format.