Respond to the following: Answer each discussion with a minimum of 300 words each or more with at least 2 references each. Use critical thinking.
Infrastructure Security and Policy
D1: Barriers to Information Sharing
Respond to the following: In this discussion, you address the meanings of the words data, information, and intelligence.
1. How does data get turned into information and then into intelligence? Cite three real-life examples.
D2: Clouds and Concealed Conduits
Respond to the following: In this discussion, you address how the cloud and concealed conduits help in the dissemination and sharing of information.
2. How does the cloud act as an amplifier to the distribution and sharing of information? Discuss the importance of concealed conduits as they encourage the use of the cloud in the dissemination and sharing of information.