Reference no: EM133559636 
                                                                               
                                       
Problem
Part I
A.	In 50-100 words, explain in your own words how threats are modeled and assessed in the cybersecurity world.
B.	In 50-100 words, explain the vulnerabilities of applications and how they are mitigated.
C.	In 50-100 words, characterize the risks involved in Mobile and Internet of Things (IOT) devices.
D.	In 50-100 words, reply to 2 of your classmates.
Part II
A.	In 50-100 words, explain in your own words how symmetric and asymmetric encryption works.
B.	In 50-100 words, explain in your own words how SSL, TLS, HTTPS work and can be utilized to defend communications.
C.	In 50-100 words, explain PKI and what this capability provides and organization.
D.	In 50-100 words, reply to 2 of your classmates.
Part III
A.	In 200-300 words, explain in your own words the difference between Defense in Depth and Depth in Defense. Which do you think is more effective and why?
B.	In 50-100 words, reply to 2 of your classmates.
Part IV
A.	In 100-200 words, do you believe that there is a difference between securing cloud networks and traditional networks? Based on the activities this week, what do you think the differences are?
B.	In 100-200 words, explain wireless security utilizing this week's reading and learning activities.
C.	In 50-100 words, reply to 2 of your classmates.
Part V
A.	In 100-200 words, explain in your own words the difference between Authentication and Authorization and how they work together.
B.	In 100-200 words, outline the Incident Response steps. Does Digital Forensics work into the Incident Response process? If so, explain.
C.	In 50-100 words, reply to 2 of your classmates.
Part VI
A.	In 100-200 words, explain Cybersecurity Resilience and why it is necessary for organizations.
B.	In 100-200 words, explain Risk Management and how Risk is assessed.
C.	In 50-100 words, reply to 2 of your classmates