+1 (218) 451-4151
glass
pen
clip
papers
heaphones

Cyber Security

Cyber Security

1)Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:  1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.–>350 Words

2)Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.There is an EXAMPLE attached to show you the format requirements.

3)Describe in your own words what a rootkit is must be between 250-300 words.