Discussion Post
• What are six examples of information technologies that could be used in computer crimes?
• What is the CIA triangle?
• What are three most common security threats?
• What are three most common security measures?
• What are 10 guidelines that should be included in a comprehensive security system?
• Explain business continuity planning.
• What are five examples of biometric security measures?
• Define zero trust security. What are three of its principles?
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.