University of Phoenix Controls Protocols and Threats Discussion

User Generated

Elnanaqenr1991

Computer Science

University of Phoenix

Description

Imagine you oversee cybersecurity for a major online sales company. It’s imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution; your job is to make sure an attack never occurs.
Create an 8- to 10-slide multimedia-rich Microsoft® PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Address the following in your presentation:

  • What do they protect against?
  • What is their purpose?
  • Write a 2- to 3-page analysis of your findings, answering the following questions:
  • How are controls or protocols implemented to defend against attacks and to limit risk?
  • What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
  • What controls and protocols would you find in a security policy?

Explanation & Answer:
8 Slides
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

Cyber security
Name
Institution Affiliation
Date

• According to studies, in four businesses, at least one suffer from loss of data.
• Majority of small scale business owners struggle with cyber-attacks.
• A recent survey shows that 63% of small business suffered attack that may
have resulted to $80000 to $250,000 loses.

Some of the cyber security Threats
• There will be a rise on internal threats.
• Hackers exist in the Long Game
• The attacks will more cases of Industrial IoT
• We should expect the extortion as well as Ransom-ware to increase.

Types of Attack vectors
• Some of the attack vectors are:
• Social engineering such as phishing, spear phishing, traditional sysrem engineering.
• Hacking that include corporate espionage, information as well as identity theft
• Breaches and cloud attacks which happens at OneDrive, Dropbox and iCloud
• Finally we have Extortion and Ransomware

Some of the defense Cybersecurity Tools
• Firewall
• Antivirus, and antimalware software
• PKI services
• Penetration testing
• Managed Detection Services

How to implement Firewall as Cyber security
tool

Modern Security Implementation

The Key Focus of cyber security
• It is to Protect the internal network of the company from attack
• It keeps the hackers out in such a way they cannot harm the company.
• It also helps in recovery fro a web attack.

How to Keep the hackers out
• Through Tools
➢ Spam filter
➢ Modern firewall
➢ Security event manager
• Through Policies
➢ Monitor all the time – 24x7
➢ Remove local admins
➢ Log review and security event
➢ Fix management and review passwords

External Web-Threat Strategy
• Educate the employees on the latest threats and the best defense
• Keep on improving the security systems
• Employ cyber security specialists who are well skilled.

How to Protect the company Internally
• Tools
➢ Modern firewall
➢ Network designs
➢ Reverse Spam Filter
➢ Anti-Malware and Anti-Virus
➢ Security Event Manager
• Policy
➢ Employee training and education
➢ Reduce employee turnover
➢ Data retention, access control ...

Related Tags