Discussion Post: Cybersecurity
Part A
a. Within the context of cybersecurity, how would you define risk management?
b. What are 3 techniques/strategies used, when an organization embarks on risk management?
c. For each of your 3 techniques/strategies,
d. Provide a brief description of each of your 3 techniques/strategies
Provide your source(s)!
Part B
a. Provide 3 examples of encryption through software
b. Provide 3 examples of encryption through hardware
c. Which would you say is more effective? encryption through software or encryption through hardware? Why?
Part C
a. Provide names of 3 countries that engage in cyber-warfare
b. Provide 3 examples of state-sponsored cyber-attacks.
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.