1. Explain their Importance 2. type of information is gained 3. tools are used to gain this information 4. How is this information used as it relates to vulnerability management and Risk 5. How does an assessment support regulatory compliance and does being “compliant” mean “secure”? why or why not As you read your classmates’ postings, think of areas where you can expand on the subject, conduct more research to further explore the topic, or examine the subject through different lenses and perspectives. highlight a new facet to build on what your classmate stated, add to the conversation, or find an alternative viewpoint and support your response with citations. It’s important to have more than “I agree” or “good point,” when responding! Try to complete your initial post early during the conference week (no later than Day 3 of the week) and plan to continue dialogue with your classmates throughout the remainder of the week. Think of our online conversations as discussion in a traditional classroom. Posting your initial post and responses at the last moment would be similar to walking into a classroom discussion with 10 minutes left in the class. You would miss the issues covered by your classmates! Remember, the intent of our conference discussion is to take the conversation to the next level – the Master’s level of discussion. In addition, posting early has its benefits. You have the opportunity to state your original thoughts without worrying that you are saying the same things that a classmate has already stated.
http://myperfecttutors.com/wp-content/uploads/2022/08/logo-image-300x115.jpeg 0 0 My Perfect Tutors http://myperfecttutors.com/wp-content/uploads/2022/08/logo-image-300x115.jpeg My Perfect Tutors2020-06-08 11:57:082020-06-08 11:57:081. Explain their Importance 2. type of information is gained 3. tools are used to gain this information 4. How is this information used as it relates to vulnerability management