“Dissonance and Attitudes” Respond to one (1) of the following discussion topics:
- The textbook describes cognitive dissonance as the difference between our beliefs and our actions. Provide three (3) examples of cognitive dissonance that you have experienced. Describe at least two (2) potential behaviors or consequences that can arise from this inconsistency.
- After reviewing the diagram in Figure 6.5 on page 220 of the textbook, describe one (1) example of your own where a recipient could process the source message through the central route or the peripheral route in order to be persuaded of your message. Explain the primary manner in which the source, the message, and the audience in your example lead to persuasive communication.
“Security Monitoring” Please respond to the following:
- Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed to enhance security in your chosen environment.
- According to the textbook, Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) example identifying when one (1) would be more appropriate to use over the other. Provide a rationale to support your chosen example.