Describe current hardware and software based cybersecurity tools, tactics, and p
ID: 3909831 • Letter: D
Question
Describe current hardware and software based cybersecurity tools, tactics, and procedures. Consider the hardware and software solutions deployed today in the context of Defense in Depth. Elaborate on why these devices are not successful against the APTs? Describe current hardware and software based cybersecurity tools, tactics, and procedures. Consider the hardware and software solutions deployed today in the context of Defense in Depth. Elaborate on why these devices are not successful against the APTs?Explanation / Answer
Answer)
The hardware and software based cyber security tools, tactics as well as procedures are as follows:
1) Implementing the formal IS Governance approaches
2) To stop the data loss
3) To detect the insider threat
4) Make a data back up
5) Check the social engineering
6) Educating as well as training the users
7) Making the policies for the new users
8) By updating the software as well as systems
9) Maintaining the compliances.
The devices are not successful against the APTs because the vast intrusion as there are intellectual property theft, compromised sensitive information, total site takeovers, database deletions.
Hope this answer helps. Happy to help. :)
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.