Discussion Post
1) Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?
2) What are the steps for an incident response plan? How does network security play into an incident response plan?
3) What are some major differences between open source and commercial\closed source software and solutions? Should you consider one over the other?
4) What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?
The response should include a reference list. Using double-space, Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.