Discussion board forums for Mission Plan 1. This document contains a list of discussion board forums for the mission plan listed in the title above. Each discussion board forum listed in this document has a matching entry in your Blackboard Discussion Board folder as a forum. Since all that is contained in the Blackboard Discussion Board forum entry is a link to this document, you must follow the instructions detailed here for each discussion board forum assignment.
When you are ready to contribute to the Discussion Board forum, be sure that you make your entry within a new Thread and for the correct forum. To get information on how to use the Blackboard Discussion board, click on the following link: http://screencast.com/t/PQU6znZhIpp
All discussion board assignments are required and are worth 3 points. For information pertaining to the grading detail, please view the rubrics for each discussion board entry within Blackboard.
To access a discussion board topic, click on the appropriate topic link below:
Topic 1-1: Discuss today's attacks
Topic 1-2: Discuss the importance of information security in our modern world.
Topic 1-3: Discuss who the attackers are.
Topic 1-4: Discuss the different varieties of attacks.
Topic 1-5: Discuss the various avenues of defense against common attacks.
Virtually everyone that is connected to information technology has at one time or another been affected by cyber criminals; 4 out of every 5 Internet users, 14 adults per second. Realistically, there are many more types of “attacks” than there are devices and these attacks are often very complex.
The table below identifies a few of the most recent attacks. This discussion assignment will require that you research and then report on 2 of these attacks.
Required presentation topics:

It is important to everyone...
Businesses and individuals are at risk of losing (in total) billions of dollars due to losses created because of breaches to data and personal information, illegal use of information, and loss of productivity!
This discussion assignment will require that you define one of five topics listed above using the following criteria:
This discussion will explore the various types of people known to be information security attackers.
Computer attackers can be divided into several categories such as:
For additional information pertaining to the categories of attackers click on the link below.
http://coursecontent.ntc.edu/CIT/husband/pois/lp1/m31-attackers.html
You are responsible for defining two attackers using the following criteria:
This topic will explore 5 basic steps that attackers may take to penetrate a computer.
There are 5 basic steps that most attackers take to penetrate a computer and these are:
Click on the link below to get more detailed information on each of these topics.
http://coursecontent.ntc.edu/CIT/husband/pois/lp1/m41-attacks.html
You are responsible for defining one of the above attacks using the following criteria:
Building a secure defense requires that multiple defense mechanisms be used. This discussion will explore these defenses.
Building a secure defense requires that multiple defense mechanisms be used. There are five fundamental defense methods commonly used in business and are listed below.
Click on the link below to get more detailed information on each of these methods.
http://coursecontent.ntc.edu/CIT/husband/pois/lp1/m51-defense.html
This discussion will require that you define two of the defenses listed above using information that you find on the Internet, my link above, and/or your own experiences. Please do not duplicate an entry that has already been made - you may contribute by adding to an existing thread.