The best way to defend your systems from attack is to know as much, if not more, about your system and its vulnerabilities than potential attackers know. You must know where and how they’ll likely attempt to compromise your systems. Discuss the moves that may be taken to compromise a company’s system.
Support your answers with information and examples from your text and your experiences. Additionally, remember to respond to at least two classmates’ posts. Posts must be substantive. Posts saying “thank you for your post†or “good post†are not substantive. Consider sharing an insight you had or why you agree/disagree with the post and your reasoning.