CTEC112 Protect unknown cyber threats

Anonymous
timer Asked: Feb 9th, 2019
account_balance_wallet $25

Question Description

Small businesses must comply with several governing regulations in regard to the efficient and effective monitoring of business IT infrastructure security.

Project1: What would you recommend for small businesses on how to protect unknown cyber threats that face them? Include free/open source tools that will help them protect the consumers’ identities.

Make sure the Report and the PowerPoint has both team members names otherwise points will be deducted.

Your Project MUST contain following format:

1. Approaches/Techniques

2. Results

3. Compare findings with other researchers, which is included in the introduction section

4. Recommendations based on your findings make future improvements

5. Conclusion

6. References


Project Requirement You must complete all 6 sections of this project, write a report, which is expected to be completed with quality. Also, a PowerPoint with findings and demo during presentation to the class.

This is a three page and 8 slides power point project if you can put a Demo on the powerpoint it will be greatly appreciated.



Tutor Answer

DoctorDickens
School: UIUC

Attached.

Running head: PROTECT UNKNOWN CYBER THREATS

Protect unknown cyber threats
Name of the student
Institution
Name of the professor
Date of submission

1

PROTECT UNKNOWN CYBER THREATS

2

Introduction
According to Brenner (2013) Small businesses are the major targets for hackers and other cybercrime attackers. As far as cyber security is concerned, small businesses have less security than
large companies although they have more digital assets to target compared to individual
consumers. The main reason why small businesses fall in to hackers' cyber security sweet spot is
because they often underestimate their risk level. In addition, due to their lack of investment in
cyber security measures and their complacent attitude of they don’t have anything worth stealing,
they are easy to attack than the large companies, and they in most cases serve as a bridge for the
attackers to gain access to the big companies they work with (Warkentin, Johnston, Walden &
Straub, 2016). In this regard, this paper seek to analyze the techniques or approaches that can be
adopted by the small businesses to protect unknown cyber threats that face them. These techniques
include: training employees in security principles, lookout mobile security, providing firewall
security for Internet connection, securing of the Wi-Fi connections and free open source tools.
Approaches/techniques
Training the employees on security principle enables companies to establish security policies and
practices. In this way, the employees will understand the importance of using strong passwords.
Besides, the employees will be able to follow the company cyber security policies since the
appropriate internet use guidelines will be established. Look mobile security entails protecting a
business from cyber-attacks on tablets and mobile phones. Being that not only computers are prone
to security breaches but also phones, small businesses should work by preventing all mobile threats
such as risks associated with side loaded apps, data leakages and malware (Chang,2012).

PROTECT UNKNOWN CYBER THREATS

3

Providing firewall security for internet connections is also another technique that can be adopted
by the small businesses to protect the unknown cyber threats. This technique thwart outsiders from
accessing data on a private network. In this regard, small businesses should install free firewall
software available online or ensure that the operating system's firewall is enabled.

Small

businesses should also ensure that their Wi-Fi networks are hidde...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors