CGMS433 University of Phoenix Cybersecurity Threats and Challenges Paper

User Generated

qubyvp

Computer Science

cgms433

University of Phoenix

Description

Write a 2- to 3-page executive summary to share with the executive staff about your recommendations, challenges, and explanations. Include the following in your summary:

  • A chart detailing 8 challenges and their impact (40-points)
  • Your top 5 prioritized categories with a rationale for the prioritization (40-points)
  • At least two references supporting your top 5 recommendations (40 points)

Note: This executive summary will also be used in the Week 3 Assignment.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: Prioritizing Threats

1

Cyber Security

Prioritizing Threats

Name
Affiliate Institution
Date

PRIORITIZING THREATS

2
Cybersecurity Executive Summary
Introduction

This executive summary seeks to highlight and elaborate on cybersecurity threats and challenges,
their impact on the organization, and recommendations to address these threats as requested by
the administrative staff. Moreover, the summary illustrates the prioritization of cybersecurity
threats in chart format alongside the results of these threats on the organization's devices,
networks, and operations.
Cybersecurity Threats/Challenges
1.
2.
3.
4.
5.
6.
7.
8.

Network Security Risks
Social Media Security Risks
Cloud Security Threats
Email Security Risks
Endpoint Security Threats
Internet of Things Security Risks
Mobile Device Security Threats
Web Application Security Risks

The chart below provides details into the prioritization of cybersecurity challenges and their
impact on the organization’s operations, networks, and devices.
Challenges

Impact on the organization
Network Security Risks

Network Travelling Worms

Encoded programs automated by hackers on an organization’s
system allow hackers and other cybercriminals to intercept data
transferred over the web (Kebande et al., 2018). These worms
also inhibit end-to-end communications between employees and
clients.

Spyware

An infestation of spyware on computers may create undesired
network congestion, CPU usage, and drive usage (Essa, Shoura,
Al Nabulsi, Al-...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags