*For your initial post (1), you must do the following: Compose a post of one to two paragraphs.
*For your response posts (2), you must do the following: Reply to at least two different classmates outside of your own initial post thread.
Before you complete your initial post, read Section 1.2 in the “Security of IP Routing Protocols” resource. In your post, analyze this question from the document: “If these companies had such a hard time getting it perfect, what chance does anyone else have?” Although this was written in 2001, many of the identified exploits still exist. If money hasn’t been the solution, what is? Justify a possible solution. Include network security and IP routing and configuration in your discussion.
In response to your peers, connect their solutions to the application of the CIA triad or Fundamental Security Design Principles (FSDPs). For reference, refer to the CIA Triad and Fundamental Security Design Principles document.