Your role as a Cyber Security Analyst requires you to protect company hardware, software and networks...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Your role as a Cyber Security Analyst requires you to protect company hardware, software and networks from cyber criminals. The Chief Information Security Officer (CISO) has selected you to undertake a short, 6-minute presentation for a prospective client. The client wants to prepare itself for prominent threats in the years to come. In undertaking the presentation, you will be promoting the research, knowledge and technical capabilities of your organisation. The CISO advised you that at a minimum, you should use contemporary literature, credible statistics and government publications to support all claims, ideas and concepts that you present. The client to whom you are presenting is technologically competent, so your presentation must be presented at an advanced level. Task: To complete the assessment successfully you must: 1. Identify and justify the two most significant cyber security threats that corporations will face in the upcoming years. Each threat that you present must be appropriately supported with contemporary evidence, logical reasoning and justification. 2. For each threat, propose one state-of-the-art cyber security countermeasure. The proposed countermeasures can be theoretical, technical, product-oriented, governance-focused or policy centric. Ensure you support each proposed countermeasure with evidence, logical reasoning and a well thought out argument. 3. For each countermeasure, you must critique the ethical, legal and/or technical challenges arising from the countermeasure you Your role as a Cyber Security Analyst requires you to protect company hardware, software and networks from cyber criminals. The Chief Information Security Officer (CISO) has selected you to undertake a short, 6-minute presentation for a prospective client. The client wants to prepare itself for prominent threats in the years to come. In undertaking the presentation, you will be promoting the research, knowledge and technical capabilities of your organisation. The CISO advised you that at a minimum, you should use contemporary literature, credible statistics and government publications to support all claims, ideas and concepts that you present. The client to whom you are presenting is technologically competent, so your presentation must be presented at an advanced level. Task: To complete the assessment successfully you must: 1. Identify and justify the two most significant cyber security threats that corporations will face in the upcoming years. Each threat that you present must be appropriately supported with contemporary evidence, logical reasoning and justification. 2. For each threat, propose one state-of-the-art cyber security countermeasure. The proposed countermeasures can be theoretical, technical, product-oriented, governance-focused or policy centric. Ensure you support each proposed countermeasure with evidence, logical reasoning and a well thought out argument. 3. For each countermeasure, you must critique the ethical, legal and/or technical challenges arising from the countermeasure you
Expert Answer:
Related Book For
Auditing and Assurance services an integrated approach
ISBN: 978-0132575959
14th Edition
Authors: Alvin a. arens, Randal j. elder, Mark s. Beasley
Posted Date:
Students also viewed these computer network questions
-
When the clerk and a supervisor count the cash in the clerk's cash drawer each time a new clerk takes control of the cash register, the amount of cash in the clerk's drawer should equal the beginning...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Question (700 words) John Densmore, a law student and part-time musician, was seriously injured in a car accident. The other car's driver, Ray Manzarek, a renowned life motivation coach and a...
-
A mathematical model for the inside of a bowl is obtained by rotating the curve x 2 + y 2 = 100 through 360 about the y-axis between y = 8 and y = 0. Each unit of x and y represents 1cm. a. Find the...
-
When might it pay to exercise an American call early? Would it pay to exercise an American put early?
-
For the data listed, tabulate cut, fill, and cumulative volumes in cubic yards between stations 10 + 00 and 20 + 00. Use an expansion factor of 1.30 for fills. End Area (ft) Station Cut Fill 10 + 00...
-
Continuing the previous problem, what was the arithmetic average return during this three-year period? a. 39.76% b. 40.00% c. 41.27% d. 42.68%
-
The U. S. Department of Transportation requires tire manufacturers to provide tire performance information on the sidewall of a tire to better inform prospective customers as they make purchasing...
-
2. Draw a sketch showing how costs are allocated to products using the two-step ABC process (first from OH cost pools to departments and then from departments to products); for the first step,...
-
You are interested in buying a share that paid its last annual dividend 9 months ago. You can assume that the next dividend payment (3 months from today) will be 1.50. The company anticipates that...
-
what ways can individuals cultivate and demonstrate personal integrity in their professional lives, navigating ethical dilemmas with moral courage, humility, and a steadfast commitment to doing what...
-
The over-50s market has long been ignored by advertising and marketing firms in favour of the market. The complexity of how to appeal to today's mature customers, without targeting their age, has...
-
ABC, Corporation has provided the following data for the month of September: Raw materials purchases..... Direct labor cost $60,000 $27,000 Manufacturing overhead cost ... $76,000 Beginning Ending...
-
On January 1, Year 1, Poultry Processing Company purchased a freezer and related installation equipment for $68,700. The equipment had a three-year estimated life with a $3,300 salvage value....
-
e) If cotx=x lies in second quadrant, find values of other trigonometric functions. 12' f) If a matrix has 8 elements, what are the possible orders it can have.
-
. Discuss the different metrics for events and meetings. What key stakeholders drive the monitoring and measurement process? Answers will vary; however, answers should incorporate a discussion of...
-
The power company must generate 100 kW in order to supply an industrial load with 94 kW through a transmission line with 0.09 resistance. If the load power factor is 0.83 lagging, find the...
-
The following is a draft set of simplified financial statements for Pear Limited for the year ended 30 September 2015. The following information is available: 1 Depreciation has not been charged on...
-
Comment on the following quote: Limited companies can set a limit on the amount of debts that they will meet. They tend to have reserves of cash as well as share capital, and they can use these...
-
Rose Limited operates a small chain of retail shops that sell high-quality teas and coffees. Approximately half of sales are on credit. Abbreviated and unaudited financial statements are as follows:...
Study smarter with the SolutionInn App