CIS 500 WEEK 3 DISCUSSION QUESTION
Cyber security and Risk Management (20 points)
- Identify one cyberattack that occurred in the last 2 years. What caused the cyber-attack? Do not repeat an example that has been posted previously.
- How did the cyberattack impact data loss, financial loss, cleanup cost, and the loss of reputation?
- If you were the manager of this company, what are some key steps you would have taken to prevent cyberattacks and enhance cybersecurity?
- Recommend information that should be in the cloud and describe which information should notbe in the cloud. Be sure to include in your recommendation your thoughts on preventing cyberattacks, addressing security concerns, or strengthening network infrastructure.
Cyber security and Risk Management (20 points)
- Identify one cyberattack that occurred in the last 2 years. What caused the cyber-attack? Do not repeat an example that has been posted previously.
- How did the cyberattack impact data loss, financial loss, cleanup cost, and the loss of reputation?
- If you were the manager of this company, what are some key steps you would have taken to prevent cyberattacks and enhance cybersecurity?
- Recommend information that should be in the cloud and describe which information should notbe in the cloud. Be sure to include in your recommendation your thoughts on preventing cyberattacks, addressing security concerns, or strengthening network infrastructure.
Cyber security and Risk Management (20 points)
- Identify one cyberattack that occurred in the last 2 years. What caused the cyber-attack? Do not repeat an example that has been posted previously.
- How did the cyberattack impact data loss, financial loss, cleanup cost, and the loss of reputation?
- If you were the manager of this company, what are some key steps you would have taken to prevent cyberattacks and enhance cybersecurity?
- Recommend information that should be in the cloud and describe which information should notbe in the cloud. Be sure to include in your recommendation your thoughts on preventing cyberattacks, addressing security concerns, or strengthening network infrastructure.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.