Discussion Post
a) What are the key elements of a multilayer process for managing security vulnerabilities based on the concept of reasonable assurance?
b) What actions must be taken in response to a security incident?
c) What is computer forensics, and what role does it play in responding to a computer incident?
The response should include a reference list. One-inch margins, Using Times New Roman 12 pnt font, double-space and APA style of writing and citations.