Examine (see attachments response 1, response 2) your classmates’ proposed security protocols and point out any areas where you believe their intended security protocols might be vulnerable, as well as ways to improve such strategies. If there are no noted vulnerabilities, proposed strategies to enhance his or her security recommendations.
Respond to at least 2 of your classmates’ posts with a minimum of 200 words each. You must have a minimum of 3 credible citations to support your claims or arguments. You must also have a reference list for the citations in the responses.