Chapter 4 and Chapter 6 of the textbook discuss Network Vulnerabilities and Hostile Code, respectively. To participate in this discussion, please complete the following:
- First, read the Guide to Computer Network Security, 3rd Edition – Chapter 4 and Chapter 6, by: Joseph Migga Kizza.
- Is it possible to locate all vulnerabilities in a network? In other words, can one make an authoritative list of those vulnerabilities? Defense your response.
- In terms of security, is client-side scripting better than server-side scripting? Is one better than the other?