Description
Imagine you oversee cybersecurity for a major online sales company. It’s imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution; your job is to make sure an attack never occurs.
Create an 8- to 10-slide multimedia-rich Microsoft® PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Address the following in your presentation:
- What do they protect against?
- What is their purpose?
- Write a 2- to 3-page analysis of your findings, answering the following questions:
- How are controls or protocols implemented to defend against attacks and to limit risk?
- What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
- What controls and protocols would you find in a security policy?
Explanation & Answer
View attached explanation and answer. Let me know if you have any questions.
Cyber security
Name
Institution Affiliation
Date
• According to studies, in four businesses, at least one suffer from loss of data.
• Majority of small scale business owners struggle with cyber-attacks.
• A recent survey shows that 63% of small business suffered attack that may
have resulted to $80000 to $250,000 loses.
Some of the cyber security Threats
• There will be a rise on internal threats.
• Hackers exist in the Long Game
• The attacks will more cases of Industrial IoT
• We should expect the extortion as well as Ransom-ware to increase.
Types of Attack vectors
• Some of the attack vectors are:
• Social engineering such as phishing, spear phishing, traditional sysrem engineering.
• Hacking that include corporate espionage, information as well as identity theft
• Breaches and cloud attacks which happens at OneDrive, Dropbox and iCloud
• Finally we have Extortion and Ransomware
Some of the defense Cybersecurity Tools
• Firewall
• Antivirus, and antimalware software
• PKI services
• Penetration testing
• Managed Detection Services
How to implement Firewall as Cyber security
tool
Modern Security Implementation
The Key Focus of cyber security
• It is to Protect the internal network of the company from attack
• It keeps the hackers out in such a way they cannot harm the company.
• It also helps in recovery fro a web attack.
How to Keep the hackers out
• Through Tools
➢ Spam filter
➢ Modern firewall
➢ Security event manager
• Through Policies
➢ Monitor all the time – 24x7
➢ Remove local admins
➢ Log review and security event
➢ Fix management and review passwords
External Web-Threat Strategy
• Educate the employees on the latest threats and the best defense
• Keep on improving the security systems
• Employ cyber security specialists who are well skilled.
How to Protect the company Internally
• Tools
➢ Modern firewall
➢ Network designs
➢ Reverse Spam Filter
➢ Anti-Malware and Anti-Virus
➢ Security Event Manager
• Policy
➢ Employee training and education
➢ Reduce employee turnover
➢ Data retention, access control ...