Discussion
1) What is the weakest link in the security of an IT infrastructure? What are some of the strategies for reducing the risks?
2) Explain in your own words why businesses must have an Internet and IoT marketing strategy
3) Describe in your own words what a rootkit is.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.