Discussion and responses_2_ETC
Subject: Emerging Threats & Countermeasures
Is simply hiding vulnerabilities and other system architecture information a solid method of defense? What methods would you suggest?
1) Discussion Topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).
2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply. To help you with your discussion, please consider the following questions:
What did you learn from your classmate’s posting?
What additional questions do you have after reading the posting?
What clarification do you need regarding the posting?
What differences or similarities do you see between your posting and other classmates’ postings?
Required Resources
* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
* Video on Security through Obscurity:https://youtu.be/UnjadBlHC5c
* https://s3.us-east-1.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6082882?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Chapter%25207%2520recording.mp4&response-content-type=video%2Fmp4&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20191028T190737Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21599&X-Amz-Credential=AKIAIL7WQYDOOHAZJGWQ%2F20191028%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=9f5abd0699f34cc70e1b8e293fe6da956ecaa88523d83765123ee37d0dc0f20a
* PPT for reference
NOTE:
– I need help from tutor regarding how to work on this task, since am new to this, so that i can work for futures assignments with minor tutor help for writing and for making corrections to my work
Solution Preview
Topic _DP
In response to this, it is true that hiding vulnerabilities cannot be considered as the best method of defense. Apparently, the method can be of great significant especially in time of emergency. However, the method cannot serve as a long term solution since the attackers will
(386 words)