1. From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security.
2. Analyze the elements of vulnerability and threat (physical, procedural, policy, etc.) that exist in an IS or telecommunications system. Suggest corresponding protection measures.
Required minimum 2 page