Cybersecurity world.

1. In 50-100 words, please explain in your own words how threats are modeled and assessed in the cybersecurity world. 2. In 50-100 words, please explain the vulnerabilities of applications and how they are mitigated. 3. In 50-100 words, please characterize the risks involved in Mobile and Internet of Things (IOT) devices. 4. In 50-100 words, please reply to 2 of your classmates. 1. In 50-100 words, please explain in your own words how symmetric and asymmetric encryption works. 2. In 50-100 words, please explain in your own words how SSL, TLS, HTTPS work and can be utilized to defend communications. 3. In 50-100 words, please explain PKI and what this capability provides and organization. 4. In 50-100 words, please reply to 2 of your classmates. Week-4 1. In 200-300 words, please explain in your own words the difference between Defense in Depth and Depth in Defense. Which do you think is more effective and why? 2. In 50-100 words, please reply to 2 of your classmates. Week-5 1. In 100-200 words, do you believe that there is a difference between securing cloud networks and traditional networks? Based on the activities this week, what do you think the differences are? 2. In 100-200 words, please explain wireless security utilizing this week's reading and learning activities. 3. In 50-100 words, please reply to 2 of your classmates. Week-6 1. In 100-200 words, please explain in your own words the difference between Authentication and Authorization and how they work together. 2. In 100-200 words, outline the Incident Response steps. Does Digital Forensics work into the Incident Response process? If so, please explain. 3. In 50-100 words, please reply to 2 of your classmates. Week-7 1. In 100-200 words, please explain Cybersecurity Resilience and why it is necessary for organizations. 2. In 100-200 words, please explain Risk Management and how Risk is assessed. 3. In 50-100 words, please reply to 2 of your classmates.