Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Yhomit Only
Open a web browser and go to the National Vulnerability Database website (https://www.kb.cert.org/vuls/) and review the currently active technology threats.
Find a few vulnerability that interest you and summarize your findings in at least 300 words describe how a security department can use these alerts.
2 references ,
one must be
Newman, R.C. (2007).Computer Forensics: Evidence Collection and Management. Auerbach
Publications: Taylor and Francis Group. ISBN: 0849305616 9780849305610