For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.

  • For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.