SelectONEof theFOURcybersecurityl scenrios, i,e., 1)
MALWARE,2)IDENTIFY THEFT, 3)RANSOM WARE,OR4)BUSINESS EMAIL COMPROMISE.(I choose e-mail compromise).
Identify5
CONTROLSfrom the list below that could used in a layered or "defense in depth" strategy.
- Anti-virus software
- Anti-malware software
- Multifactor Authentication
- File Back Ups or small cloud storage
- Password Manager app
- Credit Freeze
- Encyrption
- File Integrity Monitoring
- Firewall
- Identification
- Authentication
- Identity Theft Protection or Insurance
- Intrusion Detection/Alerts
- Password Policies (e.g., password strenthgs and rotation)
- Redundancy
- Risk Assessment
- Software Patching/Patch Management system
- Spam Filter
- App permissions
- Anti-phising training program
- System logging
- VPN software
- Physical security
- Screen locking of device
- WiFi securtiy
Step 2
DEFINE EACH OF THE 5 SELECTED SECURITY MEASURES IDENTIFY WHETHER IT IS A PREVENTATIVE, DETECTIVE or CORRECTIVE MEASURE, and JUSTIFY YOUR SELECTION OF CONTROL MEASURES.FILL IN THE TABLE ACCORDINGLY
.
Preventive measures are meant to deter. Detective measures identify so that corrective measures can be implemented. Corrective measures help mitigate damage.
(COMPLETE THE TABLE BELOW).
Pay attention to what the directions say. It does not say to define everyone of the 25 controls. It says
IDENTIFY 5 CONTROLS FROM THE LIST BELOW.
I have attached the table.
Extracted text: COMPLETE THE TABLE Security Measure Provide definition Type of Measure (Circle one or highlight in red font) Justification(Give reasons why you believe the type of measure you chose is correc) Preventive Detective Corrective Preventive Detective Corrective Preventive Detective Corrective Preventive Detective Corrective Preventive Detective Corrective