Question: 1 . Analyze various potential risks and vulnerabilities to the business operations from cybersecurity perspective: list them 2 . List what ( digital assets )

1. Analyze various potential risks and vulnerabilities to the business operations from cybersecurity perspective: list them 2. List what (digital assets) should be protected 3. List what policies are needed to protect companys computer network, servers and other equipment and to keep uninterrupted business operations. 4. Provide suggestions for implementing different access controls (including authentication and authorization) in accessing computer network and servers and data. 5. Give recommendations of either symmetric or asymmetric cryptosystem for secure communications and the use of digital signature, digital certificate, and PKI; 6. Develop policy and procedures on how to handle security incidents 7. Provide recommendations on how the company should connect to the Internet (this includes necessary hardware and software, network configurations etc against all known threats to the company's computer network) by allowing its employees to be able to access the Internet, maintaining its web server and email server while protecting the companys intranet and its database servers. Note that company's computer network consists of a database server, file servers, web server, email server and user machines separated into three LANs: corporate, sales and support. 8. Other recommendations (to protect companys computer network and equipment and to keep uninterrupted business operations that are not included above)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!