Question 1: Review this week’s required readings. Each reading details varying concepts of security protocols and technologies, defense in depth, layered security, decentralized networks, security and routing attacks, and vulnerabilities to various internal and external attacks. Briefly explain your understanding of countermeasures and defense mechanisms that could be used to protect an organizations environment. Make sure to cite and reference the sources used for this discussion, as well as indicate the associate network design discussed (e.g., defense in depth, centralized, decentralized).
Question 2: Review this week’s required readings. These readings discuss security technologies, as well as security architecture and design. Combine the concepts and explain how design choice may affect technology solution selection in the fight against threats and vulnerabilities found in the network. Make sure to cite and reference the sources used for this discussion.