1THE SECURITY ATTACKSNAME:INSTITUTIONCOURSE NUMBERCOURSE TITLE:INSTRUCTOR’S NAME:DUE DATE:2THE SECURITY ATTACKSAlthough no two or more attack events are similar, they can also be grouped into similarcategories based on the type of the attack, the virus, malware, etc., used during the incident. Toprotect the company against such occurrences, various countermeasures can be implemented,like installing antivirus to protect against malware. Additionally, the antivirus programs ensurethat the computer system automatically monitors incoming and outgoing traffic, therefore,notifying the users of an attack. BOJINCA, (2017).Additionally, one may decide to categorize the attack whether it originated internally orexternally. Internal attacks arise from within the company from perhaps the company’s users oremployees. However, more employees or users are often unaware that their accounts are gettingcompromised by hackers. Therefore, various security policies should be implemented to ensurethat the users authenticate their login through a biometric, passwords, etc. Additionally, thesecurity architect should closely check the activities of those with access to more se … Purchase document to see full attachment
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.