Question: 1 . Analyze various potential risks and vulnerabilities to the business operations from cybersecurity perspective: list them 2 . List what ( digital assets )
Analyze various potential risks and vulnerabilities to the business operations from cybersecurity perspective: list them List what digital assets should be protected List what policies are needed to protect companys computer network, servers and other equipment and to keep uninterrupted business operations. Provide suggestions for implementing different access controls including authentication and authorization in accessing computer network and servers and data. Give recommendations of either symmetric or asymmetric cryptosystem for secure communications and the use of digital signature, digital certificate, and PKI; Develop policy and procedures on how to handle security incidents Provide recommendations on how the company should connect to the Internet this includes necessary hardware and software, network configurations etc against all known threats to the company's computer network by allowing its employees to be able to access the Internet, maintaining its web server and email server while protecting the companys intranet and its database servers. Note that company's computer network consists of a database server, file servers, web server, email server and user machines separated into three LANs: corporate, sales and support. Other recommendations to protect companys computer network and equipment and to keep uninterrupted business operations that are not included above
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
