Discussion Post
• Describe the CIA triad and the defense in depth principle and why it is important in network security strategy?
• What are the steps for an incident response plan? How does network security play into an incident response plan?
• What are some major differences between open source and commercial source softwares?
• What are firewalls and VPNs? What are some alternatives to a traditional firewall and VPN?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.