CMGT 433 University of Phoenix Prioritizing Cyber Threats Essay

User Generated

tof411

Programming

CMGT 433

University of Phoenix

Description

Based on your completed security overview presentation that was 'approved for action,' the team would like more information about the type of threats and challenges that should be addressed. They want to know which threats should be prioritized and the impact they have on the organization. They would like you to:

  • Identify common categories of cybersecurity threats
  • Prioritize categories
  • Recommend a cybersecurity category to address with the organization
  • Identify challenges that mobile and cloud computing needs could bring to the organization
  • Explain the importance of testing for the detection and intrusion of risks

Write a 2- to 3-page executive summary to share with the executive staff about your recommendations, challenges, and explanations. Include the following in your summary:

  • A chart detailing 8 challenges and their impact
  • Your top 5 prioritized categories with a rationale for the prioritization
  • At least two references supporting your top 5 recommendations

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

I appreciate working with you! In case of any further edits, please do not hesitate to let me know! See you soon! Remember me as always! Would love and appreciate to work with you in the future! Goodbye

Running head: PRIORITIZING THREATS

1

Prioritizing Threats
Student’s Name
Institutional Affiliation

PRIORITIZING THREATS

2
Prioritizing Threats

With increasing technological advancements, most organizations have embraced the use
of computers among others digital devises to process their business transactions, store their data
and even enable retrieval of information among others. Despite their vital contribution to
businesses they have increasingly become targets for attacks. A cyber threat can be defined as a
malicious act that is committed with an intent to damage, steal or disrupt the normal business
operations. These threats include malware, phishing, Trojans, data breaches, password attacks
and data breaches among others. To be able to confidently use their computing devices with
confidence, organizations and individuals need first to be assured ...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4