1. In 50-100 words, please explain in your own words how threats are modeled and assessed in the cybersecurity world.
2. In 50-100 words, please explain the vulnerabilities of applications and how they are mitigated.
3. In 50-100 words, please characterize the risks involved in Mobile and Internet of Things (IOT) devices.
4. In 50-100 words, please reply to 2 of your classmates.
1. In 50-100 words, please explain in your own words how symmetric and asymmetric encryption works.
2. In 50-100 words, please explain in your own words how SSL, TLS, HTTPS work and can be utilized to defend communications.
3. In 50-100 words, please explain PKI and what this capability provides and organization.
4. In 50-100 words, please reply to 2 of your classmates.
Week-4
1. In 200-300 words, please explain in your own words the difference between Defense in Depth and Depth in Defense. Which do you think is more effective and why?
2. In 50-100 words, please reply to 2 of your classmates.
Week-5
1. In 100-200 words, do you believe that there is a difference between securing cloud networks and traditional networks? Based on the activities this week, what do you think the differences are?
2. In 100-200 words, please explain wireless security utilizing this week’s reading and learning activities.
3. In 50-100 words, please reply to 2 of your classmates.
Week-6
1. In 100-200 words, please explain in your own words the difference between Authentication and Authorization and how they work together.
2. In 100-200 words, outline the Incident Response steps. Does Digital Forensics work into the Incident Response process? If so, please explain.
3. In 50-100 words, please reply to 2 of your classmates.
Week-7
1. In 100-200 words, please explain Cybersecurity Resilience and why it is necessary for organizations.
2. In 100-200 words, please explain Risk Management and how Risk is assessed.
3. In 50-100 words, please reply to 2 of your classmates.