Question Week 4 discussions. Part 1 Vulnerabilities Across the Life Cycles [WLOs: 1, 2] [CLOs: 1, 2, 3] Prior to beginning work on this discussion forum, read the Chapters 9 and 10 from the (ISC)2 SSCP Systems Security Certified Practitioner: Official Study Guide course textbook. This will allow you to be ready to complete your discussion. You may also use any scholarly articles to enhance your discussion post found in the UAGC Library. Software vulnerabilities are found mainly when there are coding errors or design flaws, so it is important to keep this in mind at the early stages of software development in order to minimize security threats. Generally speaking, there are two types of errors: compile and runtime. Describe the differences between the two, and list several ways to minimize vulnerabilities between the two. Your initial post must be a minimum of 100 words. Any resources, including the textbook, that you use to complete this post, must be cited according to APA Style. Part 2 Waterfall Model Versus Agile Model [WLOs: 1, 2] [CLOs: 1, 2, 3] Prior to beginning work on this discussion forum, read Chapters 9 and 10 from the (ISC)2 SSCP Systems Security Certified Practitioner: Official Study Guide course textbook, and review Module 8 from Campbell-MindTap. This will allow you to be ready to complete your discussion post. You may also use any scholarly articles to enhance your discussion found in the UAGC Library. You may be wondering why you are looking at software development in a security course. Well, practically every security professional will, at some point in their career, work with software engineers that develop applications. These applications and their source code need to be properly secured, just like any other type of company information. By understanding the different development life cycles, you can take appropriate steps to properly secure each development step taken during the development of an application. The specific steps taken during a development life cycle depend on the model used. Some of these models are v-shaped, spiral, iterative and incremental, waterfall, and agile. In this discussion post, you are going to focus on the two that are most widely used: waterfall and agile. Please describe the difference between both models, and discuss why one would be used over the other when developing secure software.