Address one of the topics below: Describe an effective software development policy and provide an example. Describe what the overall goal of protecting confidentiality is. Outline some threats to a software environment. Constrast and compare different types of malicious software. What are the risks of "sloppy code" to an organization? Briefly describe what a key logger, virus, and a worm are and provide examples. Ideally, who is involved in designing and maintaining a secure organizational environment? ...