Select ONE of the FOUR cybersecurityl scenrios, i,e., 1) MALWARE, 2) IDENTIFY THEFT, 3) RANSOM WARE, OR 4) BUSINESS EMAIL COMPROMISE. (I choose e-mail compromise). Identify 5 CONTROLS from the list below that could used in a layered or "defense in depth" strategy. Anti-virus software Anti-malware software Multifactor Authentication File Back Ups or small cloud storage Password Manager app Credit Freeze Encyrption File Integrity Monitoring Firewall Identification Authentication Identity Theft Protection or Insurance Intrusion Detection/Alerts Password Policies (e.g., password strenthgs and rotation) Redundancy Risk Assessment Software Patching/Patch Management system Spam Filter App permissions Anti-phising training program System logging VPN software Physical security Screen locking of device WiFi securtiy Step 2 DEFINE EACH OF THE 5 SELECTED SECURITY MEASURES IDENTIFY WHETHER IT IS A PREVENTATIVE, DETECTIVE or CORRECTIVE MEASURE, and JUSTIFY YOUR SELECTION OF CONTROL MEASURES. FILL IN THE TABLE ACCORDINGLY. Preventive measures are meant to deter. Detective measures identify so that corrective measures can be implemented. Corrective measures help mitigate damage. (COMPLETE THE TABLE BELOW). Pay attention to what the directions say. It does not say to define everyone of the 25 controls. It says IDENTIFY 5 CONTROLS FROM THE LIST BELOW. I have attached the table
Select ONE of the FOUR cybersecurityl scenrios, i,e., 1) MALWARE, 2) IDENTIFY THEFT, 3) RANSOM WARE, OR 4) BUSINESS EMAIL COMPROMISE. (I choose e-mail compromise).
Identify 5 CONTROLS from the list below that could used in a layered or "defense in depth" strategy.
- Anti-virus software
- Anti-malware software
- Multifactor Authentication
- File Back Ups or small cloud storage
- Password Manager app
- Credit Freeze
- Encyrption
- File Integrity Monitoring
- Firewall
- Identification
- Authentication
- Identity Theft Protection or Insurance
- Intrusion Detection/Alerts
- Password Policies (e.g., password strenthgs and rotation)
- Redundancy
- Risk Assessment
- Software Patching/Patch Management system
- Spam Filter
- App permissions
- Anti-phising training program
- System logging
- VPN software
- Physical security
- Screen locking of device
- WiFi securtiy
Step 2
DEFINE EACH OF THE 5 SELECTED SECURITY MEASURES IDENTIFY WHETHER IT IS A PREVENTATIVE, DETECTIVE or CORRECTIVE MEASURE, and JUSTIFY YOUR SELECTION OF CONTROL MEASURES. FILL IN THE TABLE ACCORDINGLY.
Preventive measures are meant to deter. Detective measures identify so that corrective measures can be implemented. Corrective measures help mitigate damage. (COMPLETE THE TABLE BELOW).
Pay attention to what the directions say. It does not say to define everyone of the 25 controls. It says IDENTIFY 5 CONTROLS FROM THE LIST BELOW.
I have attached the table.


Trending now
This is a popular solution!
Step by step
Solved in 2 steps









