CTEC112 Protect unknown cyber threats

timer Asked: Feb 9th, 2019
account_balance_wallet $25

Question Description

Small businesses must comply with several governing regulations in regard to the efficient and effective monitoring of business IT infrastructure security.

Project1: What would you recommend for small businesses on how to protect unknown cyber threats that face them? Include free/open source tools that will help them protect the consumers’ identities.

Make sure the Report and the PowerPoint has both team members names otherwise points will be deducted.

Your Project MUST contain following format:

1. Approaches/Techniques

2. Results

3. Compare findings with other researchers, which is included in the introduction section

4. Recommendations based on your findings make future improvements

5. Conclusion

6. References

Project Requirement You must complete all 6 sections of this project, write a report, which is expected to be completed with quality. Also, a PowerPoint with findings and demo during presentation to the class.

This is a three page and 8 slides power point project if you can put a Demo on the powerpoint it will be greatly appreciated.

Tutor Answer

School: UIUC



Protect unknown cyber threats
Name of the student
Name of the professor
Date of submission




According to Brenner (2013) Small businesses are the major targets for hackers and other cybercrime attackers. As far as cyber security is concerned, small businesses have less security than
large companies although they have more digital assets to target compared to individual
consumers. The main reason why small businesses fall in to hackers' cyber security sweet spot is
because they often underestimate their risk level. In addition, due to their lack of investment in
cyber security measures and their complacent attitude of they don’t have anything worth stealing,
they are easy to attack than the large companies, and they in most cases serve as a bridge for the
attackers to gain access to the big companies they work with (Warkentin, Johnston, Walden &
Straub, 2016). In this regard, this paper seek to analyze the techniques or approaches that can be
adopted by the small businesses to protect unknown cyber threats that face them. These techniques
include: training employees in security principles, lookout mobile security, providing firewall
security for Internet connection, securing of the Wi-Fi connections and free open source tools.
Training the employees on security principle enables companies to establish security policies and
practices. In this way, the employees will understand the importance of using strong passwords.
Besides, the employees will be able to follow the company cyber security policies since the
appropriate internet use guidelines will be established. Look mobile security entails protecting a
business from cyber-attacks on tablets and mobile phones. Being that not only computers are prone
to security breaches but also phones, small businesses should work by preventing all mobile threats
such as risks associated with side loaded apps, data leakages and malware (Chang,2012).



Providing firewall security for internet connections is also another technique that can be adopted
by the small businesses to protect the unknown cyber threats. This technique thwart outsiders from
accessing data on a private network. In this regard, small businesses should install free firewall
software available online or ensure that the operating system's firewall is enabled.


businesses should also ensure that their Wi-Fi networks are hidde...

flag Report DMCA

Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors