Reference no: EM133676877
Discussion Post: Project Management
Part I: Network
List 10 types of attacks with two lines of definition for each one of them. Please reply to 2 of your classmates.
Part II: Java
Discuss what is an exception. In your discussion explain one advantage of using exception handling and two key words used in handling exceptions.
After completing this week's reading assignments answer the following question in 250 or more words. After you have completed your post, in 100 words or more, reply to 2 of your classmates.
Part III: Project Management
What types of contracts are there?
What is the difference between a qualitative and quantitative risk analysis?
Part IV: Cyber security
What was your biggest takeaway from podcast?
What is open-source intelligence? Is open-source intelligence enough to keep a network secure?
Give 3 example of Cyber Intelligence sites.