Discussion and response_ETC-2

Discussion and response_ETC-2

Subject: Emerging Threats & Countermeas

What is separation and what role does it play in a program of national infrastructure protection?

You must do this following:

1) Discussion topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).

2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply. To help you with your discussion, please consider the following questions:

What did you learn from your classmate’s posting?

What additional questions do you have after reading the posting?

What clarification do you need regarding the posting?

What differences or similarities do you see between your posting and other classmates’ postings?

Required Resources

* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

* https://s3.us-east-1.amazonaws.com/blackboard.lear…

* Attached chapter 3 _PPT

Subject: Emerging Threats & Countermeas

What is separation and what role does it play in a program of national infrastructure protection?

You must do this following:

1) Discussion topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).

2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.

Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply. To help you with your discussion, please consider the following questions:

What did you learn from your classmate’s posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?
What differences or similarities do you see between your posting and other classmates’ postings?

Required Resources

* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

* https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/5762061?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25203%2520recording.mp4&response-content-type=video%2Fmp4&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20190916T153309Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20190916%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=963d88702e67f83098215899198035b14fe80833a3f6752e8e8fdf43fe48dff5

 

 

Solution Preview

Topic 1_AA
In response to this, I agree with the argument that separation is a form of security that helps Organizations to prevent intruders from accessing and damaging their networks through the use of security firewalls at the separation points. Basically, separation enhances the security of networks, thus safeguarding important data in the Organizations.

(399 words)

Open chat
Hello
Contact us here via WhatsApp