Home » Downloads » You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available

You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available

You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available

You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs.

Create an 8- to 10-slide PowerPoint® presentation for your senior management describing the most common controls you would implement to counter threats to your business. Include a slide at at the end of the presentation describing:

What do the controls protect against?

How the controls work together?

Write a 1- to 2-page analysis of your findings answering the following questions.

How are they implemented to defend against attacks and to limit risk?

What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?

What controls and components would you find in a security policy?

 

 

…………………………………Answer preview…………………………………

The world today has evolved, and every individual benefits through beefed-up cybersecurity in organizations. Implementation of an effective cybersecurity is critical for any business, and especially companies that operate online. Effective cybersecurity approaches involve various protective information layers.

How the controls are implemented.

Cyber security controls can be implemented in the company by employment of experienced IT personnel to implement, run and maintain them. Training on all employees should also be carried out to make them conversant with the system, and ensure that they enhance security.

In protecting networks, OSI, TCP/IP, and SANS 20 Controls prevent the system weaknesses from coming into contact with possible threats, hence ensuring the systems are secure. They also detect threats to the system, and ensure that they are prevented from attacking the systems…………………………..

APA

295 words

Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below