Is it good security policy to always use a best security practice?

CLASS DISCUSSION: (CYBR 436) Internet & Network Security
Class discussion are designed to ensure critical reflection and application of course content as well as peer interaction. For each discussion, you will: • Post a detailed response of 100 words per question.
Q1. Most people see Bluetooth as a personal wireless network (PAN). Why is this so? What standard does Bluetooth use?
Q2. If you are an enterprise security chief, how would you go about choosing a security best practice? Is it good security policy to always use a best security practice? What are the benefits of using a best practice?
Q3. Is it possible to locate all vulnerabilities in a network? In other words, can one make an authoritative list of those vulnerabilities? Defend your response.
Q4. Study the reporting patterns of computer crimes reported by industry. Which industry best reports?

Leave a Reply

Your email address will not be published. Required fields are marked *