Post your thoughtful analysis about one key point you took from this assigned reading.
Boyle and Panko Chapter 10 Incident and Disaster Response
OWASP Top 10
Basile, C., Matteo, M.C., Mutti, S. and Paraboschi, S, “Detection of Conflicts in Security Policies”, in Vacca, J.R. (2017)
NIST 800 100 Information Security Handbook Chapter 8
An Introduction to DDoS Distributed Denial of Service Attack
Public Key Infrastructure and X.509 Public Key Certificates
OWASP Attack Surface Analysis Cheat Sheet
Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”
Post your thoughtful analysis about one key point you took from this assigned reading.