Description
You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs.
Create an 8- to 10-slide multimedia rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Include the following in your presentation:
- What do they protect against?
- What is their purpose?
Write a 1- to 2-page analysis of your findings answering the following questions.
- How are they implemented to defend against attacks and to limit risk?
- What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
- What controls and protocols would you find in a security policy?
Explanation & Answer
Please find attached. Let me know if you need any clarification on the work.
Controls Protocols and
Threats
Controls
• Authentication
– It is used to prevent network eavesdropping,
brute force and dictionary attacks and credential
theft.
– It identifies the person or system attempting to
connect to the network and decides whether they
are allowed to access the network.
Controls
• Digital signatures
– This prevents against repudiation, where users
can deny that they sent or received information.
– They ensure digital documents originate from the
person claiming to have sent it and they are not
modified in any way.
Controls
• Firewalls
– These are network security devices that keep
attacks or external threats from getting access to
the system.
• These unwanted programs include worms, viruses or
trojan horses.
– It monitors incoming and outgoing network traffic
and decides whether to allow or block specific
traffic based on a defined set of rules.
Protocols
Protocols
• TCP/IP(Transmission Control
Protocol/Internet Protocol)
– These are protocols used t...