Description
You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs.
Create an 8- to 10-slide PowerPoint® presentation for your senior management describing the most common controls you would implement to counter threats to your business. Include a slide at at the end of the presentation describing:
- What do the controls protect against?
- How the controls work together?
Write a 1- to 2-page analysis of your findings answering the following questions.
- How are they implemented to defend against attacks and to limit risk?
- What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
- What controls and components would you find in a security policy?
Submit your assignment using the Assignment Files tab.
Explanation & Answer
Attached.
CONTROLS, PROTOCOLS, AND
THREATS
Name:
Institution:
Date:
Introduc tion
▪ Implementation of an effective cybers ecurity is critical for any bus ines s ,
and es pecially companies that operate online
▪ E ffective cybers ecurity approaches involve various protective layers
covering the information, networks , programs , and all the devices s uch
as computers that a company intends to have s ecured
▪ In a company, the pers onnel, operations , and technology mus t be
complementing each other for the creation of an effective cybers ecurity
mechanis ms
Cybersecurity
▪ For cybersecurity measures to be effective, every individual in the company
must have an understanding and compliance with the data-security
principles, such as usage of strong passwords, backing-up information and
exercising caution when attaching emails.
▪ To ensure cybersecurity, technology must be utilized to implement the most
effective controls to ensure no kind of attack makes it through the system
▪ Three critical areas must be guarded against cybersecurity: end-point devices
such as computers, smart-devices, and routers; networks and the cloud
Cybersecurity Controls
▪ For the company, preventive and detective security controls are necessary
to block all manner of cyber-attacks
▪ Preventive cybersecurity controls shall function to block all threats from
coming into contact with the company’s weaknesses, these controls
include firewall...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!