DISCUSSION 6Please respond to the following in a post of 150–200 words:Distinguish among character, block, and stream ciphers.Specify when to use each.Note: Remember to cite any sources you use, including your textbook, using the Strayer Writing Standards format.DISCUSSION 7The three major types of malicious activities that organizations’ information systems face include:Hostile or malicious insider activity.Theft of private, proprietary, or sensitive data, by insiders or external attackers.Large scale DoS (denial-of-service) attacks.Go to Strayer University Library to research one of these types of malicious activities.Please respond to the following in a post of 150–200 words:Based on your research:Describe a present-day example of your selected type of malicious activity and its impact on the organization.Specify the countermeasures the organization took to address the malicious activity.Recommend at least one additional preventative countermeasure and at least one countermeasure organizations could take to address this type of activity once it has occurred.Provide a full citation and reference, formatted according to Strayer Writing Standards.For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.