Controls Protocols and Threats, What do they protect against

User Generated

Ubbg1991

Other

Description

You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs.

Create an 8- to 10-slide multimedia rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Include the following in your presentation:

  • What do they protect against?
  • What is their purpose?

Write a 1- to 2-page analysis of your findings answering the following questions.

  • How are they implemented to defend against attacks and to limit risk?
  • What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
  • What controls and protocols would you find in a security policy?

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find attached. Let me know if you need any clarification on the work.

Controls Protocols and
Threats

Controls
• Authentication
– It is used to prevent network eavesdropping,
brute force and dictionary attacks and credential
theft.
– It identifies the person or system attempting to
connect to the network and decides whether they
are allowed to access the network.

Controls
• Digital signatures

– This prevents against repudiation, where users
can deny that they sent or received information.
– They ensure digital documents originate from the
person claiming to have sent it and they are not
modified in any way.

Controls
• Firewalls

– These are network security devices that keep
attacks or external threats from getting access to
the system.
• These unwanted programs include worms, viruses or
trojan horses.

– It monitors incoming and outgoing network traffic
and decides whether to allow or block specific
traffic based on a defined set of rules.

Protocols

Protocols
• TCP/IP(Transmission Control
Protocol/Internet Protocol)
– These are protocols used t...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags