Discussion
In your initial post, reflect on the variety of tools used in the final project to identify various network security risks and vulnerabilities at HealthNet. These tools were used to monitor, identify, and remediate external attacks by unauthorized users. Such mitigation strategies can be used to help safeguard data. But what happens if an attack emerges from inside the organization?