Discussion Post
o What types of threats can impact operations of the infrastructure? What steps can be taken to protect systems in the infrastructure (server or desktop systems and beyond)?
o How can threats from Internet-based activities, such as the use of e-mail and web browsing, be mitigated? What is the responsibility of the user community in mitigating such threats?
The response should include a reference list. One-inch margins, Using Times New Roman 12 pnt font, double-space and APA style of writing and citations.