For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event

 

  • For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event