Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Deadlinei is 4 pm Wednesday pst
I need this the next 16 hours
Instructions: Identify and select appropriate technologies to protect against Malware, Spyware, Ransom ware, Phishing, Data Theft, viruses, security breaches, and natural disasters , and provide an explanation as to why the technology was chosen.Describe where you plan to place these technologies within the network and why. The plan should cover all layers of the OSI model.Identify additional software that will be required to monitor the network and protect key assets.Identify any security controls that need to be implemented to assist in mitigating risks.Mitigate all of the risks that were identified during the assessment phase.