Key Topics
Requirement
Information Security
Select a video from https://www.brighttalk.com/ in the security section. You may also use other sites but the video must be publicly available and should be from a credible source. Do not use amateur videos from YouTube. You may choose a video related to a topic covered in the textbook.
I suggest you view the video more than once and take notes. You then need to provide a brief summary of the video in your own words. Explain what you learned about security from the video and why you selected this particular video. Would you recommend this video to others? You should include any key points or issues raised. You may research other sources to support your points. Make sure to cite your sources.
Note: If you are unsure of your video selection, send me the title of the video and a web link. I will let you know if the video is appropriate, but do not wait until the last minute and expect an immediate answer from me. If you would like my assistance, I suggest your start looking immediately.
Requirements
You must choose an information security video of at least 5 minutes in length.
Your video must be appropriate (from BrightTalk or another site approved by me).
Summarize the content of the video in "your own words" capturing the key points of the video.
Solution
Introduction
The selected video is related to kill chain of cyber security. This video provides us different suggestions to prevent cyber-attacks. This video concludes that cyber-attacks can be prevented by implementing different security measures in chain one by one. It is necessary for everyone to secure the data to maintain the confidentiality of available information. This can help someone in save their system from various unauthorized access. Data in a computer system can be secured by following different measures such as by setting a strong password. It helps in maintain the confidentiality of our information. The information contains very important document of the organization, and wrong utilization of these documents can lead to business failure (Von Solms, 2013). This is because the hacker utilizes the information in wrong way which harms the reputation and competitive position of the organization. This video is selected because it provides various beneficial information about the security of information technology which can be utilized by one person to protect their system from unauthorized access. Following the suggested information leads success of every business organization because they are able to maintain their information which can be easily utilized to gain a competitive advantage in the market.
The effective ways through which one can ensure security in the chain contain following:
Antivirus Software's: It is known as an effective measure of the preventing system from unauthorized access (Rjaibi, 2013). It helps the organizations in protecting their data from the different unknown virus.
Encryption: Encrypting the data using an important key which is only utilized by higher level managers of the organization.
Adopting Intrusion detection system which helps the organizations to detect intruders who might cause a threat to network data.
Utilizing packet inspection to ensure the integrity of data without being changed during traveling.
Creating a special pack of data which can only utilize in case of data gets hacked.
I also recommend this video to others because it gives us important information about the security threats which can help one in maintaining the confidentiality of their information.
Place Order For A Top Grade Assignment Now
We have some amazing discount offers running for the students
Place Your OrderReferences
-
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
-
Rjaibi, N., Rabai, L. B. A., & Aissa, A. B. (2013). The mean failure cost cybersecurity model toward Security measures and associated mechanisms.International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(2), 23-35.
+1-817-968-5551
+61-488-839-671
+44-7480-542904




