CyberSecurity: explain how your solution addresses the following data collection and implementation elements,

CyberSecurity A.  Describe the consensus-based policies developed for the solution to your cybersecurity problem, including standards and practices that were adopted to facilitate implementation of the solution and a description of the cybersecurity problem being addressed. 1.  Summarize how the solution supports decision-making capabilities and the needs of the environment where the solution was implemented. … Read more

Describe the following best practices or methods for detecting a threat actor.

1) Develop reliable, ethical methods to detect, characterize, and counter cyber threat actors 2) Describe the following best practices or methods for detecting a threat actor. Awareness Awareness educates users about the importance of security objectives and current trends. Additionally, it is important to understand why rules are in place and are motivated to follow … Read more

Cybersecurity Policy Catalog-Explain the proposed cybersecurity policy statement and reasons why the policy statement may be controversial.

Cybersecurity Policy Catalog. Create a security policy catalog comprising a set of security policies for a hospital organization. Explain each security policy in detail with supporting justification for the policy. Explain the proposed cybersecurity policy statement and reasons why the policy statement may be controversial. Provide a justification for the determined security testing methodology you … Read more