issc452 exploitation discussion
All posts must be a minimum of 250-300 words. Be sure to list your references at the end of your post. References must be in APA citation format.
In learning information security, it is important to understand that threats to your company’s information assets are present 24/7 and that there is never a time when a threat is not present. Take a look at the following categories of threats. You are in charge of a team that must deal with the below lists of threats. What prevention methods will your team implement to handle the threats? Please explain the reasons for your decisions.
1. Acts of human error
2. Software threats
3. Deviations in services
4. Hardware failures or errors
5. Software failures or errors
|Synthesis of Concepts||55|
|Clear Citations using APA format||10|
|Peer Reviews (minimum of 2)||15|