Software Security Defects

Description

Discuss peer review concepts and how they benefit the SDL process. Discuss how you prioritized vulnerabilities discovered for mitigation.