4/3 Discussion


  1. Read Chapters 14–17 in your textbook.
  2. Using the discussion link below, respond to the following prompts and questions:
    1. What types of threats can impact operations of the infrastructure? What steps can be taken to protect systems in the infrastructure (server or desktop systems and beyond)?
    2. How can threats from Internet-based activities, such as the use of e-mail and web browsing, be mitigated? What is the responsibility of the user community in mitigating such threats?
  3. Your initial post should be at least 300 words and supported with at least three references.