Controls, Protocols, and Threats

User Generated

WnivWvzrarm91

Computer Science

CYB120

Description

You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs.

Create an 8- to 10-slide PowerPoint® presentation for your senior management describing the most common controls you would implement to counter threats to your business. Include a slide at at the end of the presentation describing:

  • What do the controls protect against?
  • How the controls work together?

Write a 1- to 2-page analysis of your findings answering the following questions.

  • How are they implemented to defend against attacks and to limit risk?
  • What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
  • What controls and components would you find in a security policy?

Submit your assignment using the Assignment Files tab.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

CONTROLS, PROTOCOLS, AND
THREATS
Name:
Institution:
Date:

Introduc tion
▪ Implementation of an effective cybers ecurity is critical for any bus ines s ,
and es pecially companies that operate online
▪ E ffective cybers ecurity approaches involve various protective layers
covering the information, networks , programs , and all the devices s uch
as computers that a company intends to have s ecured
▪ In a company, the pers onnel, operations , and technology mus t be

complementing each other for the creation of an effective cybers ecurity
mechanis ms

Cybersecurity
▪ For cybersecurity measures to be effective, every individual in the company
must have an understanding and compliance with the data-security
principles, such as usage of strong passwords, backing-up information and
exercising caution when attaching emails.
▪ To ensure cybersecurity, technology must be utilized to implement the most
effective controls to ensure no kind of attack makes it through the system
▪ Three critical areas must be guarded against cybersecurity: end-point devices
such as computers, smart-devices, and routers; networks and the cloud

Cybersecurity Controls
▪ For the company, preventive and detective security controls are necessary
to block all manner of cyber-attacks
▪ Preventive cybersecurity controls shall function to block all threats from
coming into contact with the company’s weaknesses, these controls
include firewall...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags