Would you expect the most common type of attack to exploit


Challenges to Information Security

o what do you think is the biggest challenge to information security? Why?

o Before reviewing this initial material, would you have said the same thing? Why or why not?

• Write a one-page paper to summarize your thoughts

• Common Types of Attacks

o What do you think is the most common type of attack and why?

o Would you expect the most common type of attack to exploit the most common vulnerabilities? Why or why not?

• Write a one-page paper to summarize your thoughts

PPT (Power Point) 1

• As part of National Cybersecurity Awareness Month LPCS has been conducting a series of "Lunch-and-Learn" meetings each Monday and Friday for local citizens and small business owners to learn more about security. LPCS has asked you to present an introductory session on the fundamentals of security: what it is, why it is important today, who are the attackers, what types of attacks do they launch, etc.

1. Create a PowerPoint presentation that explains what IT security is and why it is important today. Include who is responsible for attacks and their attack techniques. Your presentation should be seven to ten slides in length.

2. As a follow-up to your presentation, create a Frequently Asked Questions (FAQ) sheet that outlines general principles that can be used to protect valuable assets. Write a one- page FAQ about security protections.
(Power Point) -2

• Manna is a regional bakery and cafe´. Although Manna has used an outside security consultant to help their small IT team with security they nevertheless have been the victims of several attacks over the last two quarters. Manna decided not to renew the consultant's contract and has now turned to LPCS for assistance. While LPCS is performing an audit and evaluating the enterprise's current security position, LPCS has asked you to conduct a presentation about malware to the staff of three of Manna's retail sites during their annual regional meeting.

1. Create a PowerPoint presentation that lists 15 different types of malware and defines each type in detail regarding what the malware can do, how it spreads, its dangers, etc. Your presentation should contain at least 10 slides.

2. After your presentation, it is apparent that some of the attacks were the result of social engineering. Manna has asked you to create a one-page "cheat sheet" that describes social engineering attacks and how they may be performed, including a list of practical tips to resist these attacks. This sheet paper will be posted in the stores in which employees can make quick reference to when necessary. Create the paper for Manna, using a format that is easy to reference.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Would you expect the most common type of attack to exploit
Reference No:- TGS02908219

Now Priced at $30 (50% Discount)

Recommended (97%)

Rated (4.9/5)