Discussion


 

Discussion: Implementing Processes and Procedures

This chapter discussed the technologies, processes and procedures that cybersecurity specialists use to defend the systems, devices, and data that make up the network infrastructure. Review the chapter and in your initial post, describe at least three different processes and procedures you can implement on your computer. Explain how each one will protect the network infrastructure.

Initial posts are due by Wednesday at 11:59 PM CT. Your two peer responses are due by Sunday at 11:59 PM CT.