Description
Subject: Emerging Threats & Countermeasures
Is simply hiding vulnerabilities and other system architecture information a solid method of defense? What methods would you suggest?
1) Discussion Topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).
2) Select AT LEAST 2 other students' threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply. To help you with your discussion, please consider the following questions:
- What did you learn from your classmate's posting?
- What additional questions do you have after reading the posting?
- What clarification do you need regarding the posting?
- What differences or similarities do you see between your posting and other classmates' postings?
Required Resources
* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
* Video on Security through Obscurity:
* PPT for reference
NOTE:
- I need help from tutor regarding how to work on this task, since am new to this, so that i can work for futures assignments with minor tutor help for writing and for making corrections to my work
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Attached.
Attached.
Running head: SYSTEM VULNERABILITIES
System vulnerabilities
Student’s Name
Course Number- Name of Course
Instructor’s Name
Date
1
SYSTEM VULNERABILITIES
2
System vulnerabilities
Topic 1_DM
I have learned that hiding vulnerabilities and other system architecture are not solid
methods of system of defense but can be done in three times based on the emergenc...