Discussion Post
• Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?
• What are the steps for an incident response plan? How does network security play into an incident response plan?
• What are some major differences between open source and commercial\closed source software and solutions? Should you consider one over the other?
• What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?
The response should include a reference list. Using double-space, Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.