Engineering iscc3 Yhtomit
PART1:Many times, we are faced with strange computer behaviors. Do you believe that unexpected behavior in a computer program necessarily a vulnerability? Why or why not?2 pagesAPA Format3 SourcesDue ASAPhttps://www.youtube.com/watch?v=7Wb_qLROGkEPART2Discuss the implementation of CIA with practical examples demonstrating the importance of all 3 areas2 pagesAPA Format3 SourcesDUE SAT