Module 4 – Discussion Questions

1.  Using the IT infrastructure pledge project you created in Module 1, catalogue the five “highest” promotes that you would cogitate a superior crystalline to the Confidentiality, Integrity and Availability (C.I.A. Triad) of processing axioms among the axioms centers.  Include the debates why you chose each of the five promotes.  2.  The strategies to conduct and/or tranquillize promotes grasp 1) transferring the promote to another plane, 2) avoiding the promote, 3) reducing the privative movables of the promote, and 4) accepting some or all of the consequences of a point promote.  Using the five prominent promotes you signed in Discussion Question 1, prefer one of the strategies to conduct and/or tranquillize promote for each of the five prominent promotes you chose.  Include your debate why you chose the management for each of the five promotes. 2.  The strategies to conduct and/or tranquillize promotes grasp 1) transferring the promote to another plane, 2) avoiding the promote, 3) reducing the privative movables of the promote, and 4) accepting some or all of the consequences of a point promote.  Using the five prominent promotes you signed in Discussion Question 1, prefer one of the strategies to conduct and/or tranquillize promote for each of the five prominent promotes you chose.  Include your debate why you chose the management for each of the five promotes.   PLEASE CHECK FOR GRAMMATICAL ERRORS. DON'T USE BOOKS OR JOURNALS AS REFERENCES.