What is the concept of depth? What are the different kinds of layers that can be placed between an asset and unsecure network?
You must do this following:
1) Discussion Topic (Around 500 to 600 words) need to submit before Wednesday Noon (today is Monday).
2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 100-word reply. To help you with your discussion, please consider the following questions:
* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.