Assignment:
Why do networking components need more examination from an InfoSec perspective than from a systems development perspective? What value would an automated asset inventory system have for the risk identification process? Which information attributes are seldom or never applied to software elements?
Your answer must be, typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format and also include references.