1. Prevent, Detect, and Respond to Cyber Attacks
 Discuss how automated cybersecurity tools can support operations  personnel as they attempt to prevent, detect, and respond to  cyber-attacks against a company's networks and information systems.
 
 2. Anti-Virus Policies for Operational Systems
 Research the use of anti-virus software applications to defend an enterprise computing environment.
 Should an organization's anti-virus policy specify that anti-virus  applications will be configured to quarantine infected files instead of  deleting them automatically? Why or why not?
 
 3. Protecting the Internet of Things
 Watch the video interview segment with Mr. Benga Erinle in which he  discusses placement of protective devices within the Internet of Things.  https://youtu.be/bt0iGxF9OXE
 What types of strategies should be used to defend the Internet of Things  from cyber-attack? Do you agree or disagree with the strategies which  Mr. Erinle put forth? Why?