For this assignment, you will create a presentation for senior management that analyzes risk management.

For this assignment, you will create a presentation for senior management that analyzes risk management.

For this assignment, you will create a presentation for senior management that analyzes risk management.

Note: Your content should address a specific organization that you know or a suitable alternative on the Internet.

Be sure your presentation includes the following:

A review of the cybersecurity attack lifecycle from external sources.
An overview of malicious and accidental internal threats.
The implications of cloud computing.
Identification of processes for performing a risk assessment and associated mitigation.
At least three simple images, tables or other graphics created by you and not copied from other sources.
Length: 5 to 8-content slides, a conclusion, and references. At least 200 words of notes for each slide, including any citations. Add audio using voice-over in PowerPoint or record using Kaltura.

References: Include a minimum of 2 scholarly resources in addition to those provided within the course.

The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and adhere to the Northcentral University’s Academic Integrity Policy.

When applicable, conduct a Turnitin pre-check and then upload your completed assignment and click the Submit to Dropbox button.

————————

Week 3 Resources

Understand the Cyber-Attack Lifecycle
Capano, D. E. (2019). Understand the cyber-attack lifecycle. Control Engineering, 66(7), 32.
A cyber kill chain is a model for understanding the lifecycle of a cyber-attack used by those working with critical infrastructure to enhance cybersecurity strategies, technology, training, and ICS design.
Cybersecurity: Human Assets
Capano, D. (2019). Cybersecurity: Human assets. Control Engineering, 66(11), 41.
Even if technological systems are stable, human hacking, or the compromise of human assets, is often the first step in a cybersecurity breach. Assist colleagues and others in the supply chain to avoid being an assault entry point. Read about five different attack strategies, five different attack styles, and five different prevention techniques.
Cloud Computing Security Risks: Identification and Assessment
Patel, K., & Alabisi, A. (2019). Cloud computing security risks: Identification and assessment. Journal of New Business Ideas and Trends, 17(2), 1.
This paper investigates the security threats associated with different forms of cloud computing to provide a concise overview. The methodology used in this paper entails a review of the literature on cloud computing security threats in order to provide a comprehensive overview of the issues.
Understanding Security Threats in Cloud Environments
Santos, O., & Taylor, R. (2020). 1.11 Understanding security threats in cloud environments (Lesson 1: Understanding cybersecurity threats against on-premise and cloud environments) [Video]. In CCNP and CCIE security core SCOR 350-701. Pearson IT Certification.
Since cloud-based services are accessible via the Internet, they are open to a number of attacks. Some of the potential attack vectors that criminals and threat actors might attempt include session hijacking, which is whenever the attacker can actually sniff or intercept traffic to takeover a legitimate connection to a cloud service, or a DNS-based attack, or cross-site scripting, SQL injections, session riding, and many other application-based vulnerabilities. In this video, you will understand security threats in cloud environments.

Image preview for”for this assignment, you will create a presentation for senior management that analyzes risk management. “

For this assignment you will create a presentation for senior management that analyzes risk management.

APA

9 slides

Click the purchase button to get full answer.

Open chat
Hello
Contact us here via WhatsApp