What controls and protocols would you find in a security policy?

Question description

You are in charge of cybersecurity for a major online sales company. It is imperative that you have the most effective cybersecurity available, Resolution after an attack has occurred is not a viable solution. You need to make sure an attack never occurs.

Create an 8- to 10-slide multimedia rich PowerPoint® presentation, including interactive diagrams, media, or videos, displaying the most common controls, protocols, and associated threats to your business. Include the following in your presentation:

  • What do they protect against?
  • What is their purpose?

Write a 1- to 2-page analysis of your findings answering the following questions.

  • How are they implemented to defend against attacks and to limit risk?
  • What significance do the OSI, TCP/IP, and SANS 20 Controls play in network protection?
  • What controls and protocols would you find in a security policy?