1. Study and suggest the best ways to defend the national critical infrastructure from potential attackers.
2. We indicated in the text that the best ways to manage security threats is to do an extensive risk assessment and more forensic analysis. Discuss how reducing the turnaround time can assist you in both risk assessment and forensic analysis. What are the inputs into the forensic analysis model? What forensic tools are you likely to use? How do you suggest to deal with the evidence?