Prior to beginning this discussion, read Chapter 1 of the course text and complete the following SWOT Analysis activity. After completing the activity, attach it to your 1st post by….
List the reason or reasons why computer attacks are successful
1.Attack Experiences – Based on your own personal experiences or those of someone you know (you may have to interview other students or a friend, lab partner), write one- to two paragraphs regarding a computer attack that occurred. When did it happen? What was the attack? What type of damage did it inflict? List the reason or reasons your think that the attack was successful. How was the computer fixed after the attack? What could have prevented it?
2.Security+ Certification Jobs – What types of jobs require a Security+ certification? Using online career sites such as monster.com, careerbuilder.com, jobfactory.com and others, research the types of security positions that require a Security+ certification. Create a table that lists the employer, the job title, a description of the job, and the starting salary (if these items are provided).