Recent Tweets on Cybersecurity Research Paper
I’m working on a Computer Science question and need guidance to help me study.
- Again you are to find recent tweets that are particularly interesting to you pertaining to cybersecu- rity. While you will write up five tweets, you may use any of the people you follow (including any of the people I showed you or any you have added). For each of these people, post a link to a tweet that is particularly interesting, and summarize it in about two sentences each, using Solution1A:, Solution1B: etc for each. Do not just cut and paste, and do not just take the first line or two of the main content of the tweet. Actually summarize it for yourself. For example:
Solution1A: Link: https://twitter.com/Th3G3nt3lman/status/1268832976919560193 Shows how ServiceNow (cloud-based company offering IT services management) exposed information it should not. In its Knowledge Management application, once an entry is created with endpoint of form KB00xxxx, they are publicly reachable and but should not be, leaking passwords, corporate domain tokens, and Personally Identifiable Information (PII) between employees.
remembering that ALL of the above line is a single line (no carriage returns except after the final word employees.).
- Again find five (5) interesting posts from any of the security blogs you wish (including those I showed you). For each, using Solution2A:, Solution2B: etc., find a post and summarize it much like you did in question 1.