How are they implemented to defend against attacks and to limit risk
Controls, Protocols, and Threats
You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs.
Create an 8- to 10-slide PowerPoint® presentation for your senior management describing the most common controls you would implement to counter threats to your business. Include a slide at at the end of the presentation describing:
What do the controls protect against?
How the controls work together?
Write a 1- to 2-page analysis of your findings answering the following questions.
How are they implemented to defend against attacks and to limit risk?
What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
What controls and components would you find in a security policy?
Submit your assignment using the Assignment Files tab.
Solution preview
The world today has evolved, and every individual benefits through beefed-up cybersecurity in organizations. Implementation of an effective cybersecurity is critical for any business, and especially companies that operate online. Effective cybersecurity approaches involve various protective information layers……………………….
APA
295 words