Conduct research using the library and Internet for information about security flaws in UNIX, open source, and Windows operating systems.
- From your research, select 1 security flaw for further discussion. Your selection can be for any of the operating systems.
- Describe the security flaw and discuss how the security flaw is manifested.
- Provide a review of a security incident related to the flaw, and discuss the impact of the security breach as well as the response to the breach.
- Include recommendations for how the incident could have been avoided.