Please the two sources below and 2 sources approved by google scholar. text book

Please the two sources below and 2 sources approved by google scholar. text book discusses reducing cyber vulnerability in        National Security. Select two recommendations from the National  Infrastructure Advisory Council that would be most effective in     reducing the cyber threat. Provide at least two reasons for your selections. twPko reasons for your selections.