Assignment task: IT networking and security
Discuss the following:
Of the two defense models discussed, vulnerability-centric and threat-centric, which do you feel is the superior method for protecting the assets of an organization? Support your preferred method with scholarly citations and respond to two posts by either politely disagreeing and supporting your argument, or building on the individual's thesis.