Description

Hello , pls answer below 3 questions in a separate WORD Doc

Sub: Cybersecurity Planning and Management

  1. In 500 words, It is important to understand that humans and technology interact in all information systems. Why do you feel businesses must spend time and money to educate their employees on security matters? Use at least three sources. Use the(https://libguides.nec.edu/az.php)not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.

Write in essay format not in bulleted, numbered or other list format.

2)From below ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3paragraphs in length .

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://www.sans.org/newsletters/

====================================================================

Sub: Network Security

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.