How are they implemented to defend against attacks and to limit risk

How are they implemented to defend against attacks and to limit risk

Controls, Protocols, and Threats

You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs.

Create an 8- to 10-slide PowerPoint® presentation for your senior management describing the most common controls you would implement to counter threats to your business. Include a slide at at the end of the presentation describing:

What do the controls protect against?

How the controls work together?

Write a 1- to 2-page analysis of your findings answering the following questions.

How are they implemented to defend against attacks and to limit risk?

What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?

What controls and components would you find in a security policy?

Submit your assignment using the Assignment Files tab.

 

Solution preview

The world today has evolved, and every individual benefits through beefed-up cybersecurity in organizations. Implementation of an effective cybersecurity is critical for any business, and especially companies that operate online. Effective cybersecurity approaches involve various protective information layers……………………….

APA

295 words