Please write answers to the below questions in word document separately and add 2-3 clickable references at the end of the document
1.Ethical Hacking:
A.Discussion
Write not less than 300 words, Tech companies prepare for cyberattacks using common cybersecurity resources.
Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:
1. monitoring and assessment,
2. policies and controls,
3. hiring,
4. software,
5. firewalls,
6. authentication and access,
7. encryption.
B> Assignment:
Write not less than 300 words, Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words.
There is an EXAMPLE attached to show you the format requirements.
————————————
2.Information Assurance:
Describe in your own words what a rootkit is.
0 comments