

Plants vs Zombies 2 features the same fun gameplay that helped the first game become game of the year. It should also be noted that the zombies are dressed differently depending on the period of history you find yourself in. With this greater variety of units and enemies, it becomes even more complicated to get through all the levels in the game.Īlong with the sunflowers and pea throwers, there are a number of new troops that can further decimate the zombie ranks. This time, however, you not only have to defend the garden from a zombie attack, but you also have to travel through time to protect some key locations around the world, always with the help of your plants.Īs you would expect from a good sequel, Plants vs Zombies 2 features a few new plants, and a whole host of new zombies. Your mission is to defend your location (a house) against incessant zombie attacks using an army made up of different plants. Zombies 2 is the sequel to the popular 'tower defense' game from PopCap. This review attempts to display the importance of developing a national security policy created for mobile devices in order to protect sensitive and confidential data.Plants vs. Moreover, mobile devices are even more vulnerable than personal desktop computers because more people are using mobile devices to do personal tasks. Traditional security software found in desktop computing platforms, such as firewalls, antivirus, and encryption, is widely used by the general public in mobile devices. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information however, the availability of this information has caused an increase in cyber attacks.
