Discussion

 

At the end of chapter 8,  case studies and examples are presented about actual exploited risks. Choose Critical Infrastructure case studies and describe the risk that was exploited.  Also,  tell how you think that exploit could be avoided using proper technology and security policies.  

Your main post needs to be at least 300 words long 

Tags: No tags