- Read Chapters 9–13 in your textbook.
- Using the discussion link below, respond to the following prompts and questions:
- Identify the security components necessary to protect the information systems infrastructure. What key hardware components should be implemented?
- Why are authentication methods important in assuring that only authorized users are accessing the system? Classify the levels of access controls.
- Explain the use of an intrusion detection system (IDSs). How does such a system identify an intrusion? Differentiate between network level and host-based IDSs.
- Your initial post should be at least 300 words and supported with at least three references.
1-2 page critique of the film after selecting a character in the movie (main character most of the time) and completing a diagnostic impression as