to conduct a vulnerability assessment. Please include the web URL and share with your classmates.
Discuss the purpose of the security development life cycle and how it is used for testing security systems. Using the Internet, find two to three tools that could be used…