Question: 1 . How do threats and vulnerability differ? Explain. 2 . What are some ways to assess security of data, applications, network and services? 3

1. How do threats and vulnerability differ? Explain.
2. What are some ways to assess security of data, applications, network and services?
3. Explain the CIA triangle and give examples of each.
4. Explain validation and how three-factor authentication (multi-factor) would further secure validation.
5. Explain the relationship of backup with recovery in process.
6. What is the difference between AWS CloudTrail and CloudWatch?
7. Given the CIS report on Apache, what can be done to "harden" it?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!