a) less than truly competent software developers. The mitigation is to only hire highly qualified software developers.
b) Theft of intellectual property. The mitigation is registering your property under copyright to enable the company to track malicious production of the same.
c) Theft of identity. The mitigation can be done by setting up firewalls.
d) Theft of information, sabotage, and information extortion. The mitigation can be done by setting strong passwords and secure machine and anti-virus for detection.
Comments
Leave a comment