t=""> -Bloom (1994irector is th, p.32) states, "The d e key figure in establishing organ

J For this assignment, you will need to interview one (1) military and one (1) civilian security practitioner (non-management) concerning information and cyber-warfare. If you are unable to acquire such an interview, conduct a mock interview where you draft a hypothetical situation. Document this interview with word processing software to provide a transcript for the interview. Your interview questions should focus on the following topics: How information weaponries are being used to acquire knowledge about their organizational strategies. Plans and security measures that have not been effective to reduce information risks. Why have these measures been ineffective according to your interviewees?