Deliverables 1 through 5 focus on preparing you for the final capstone project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable
Answer preview
The growth of cybersecurity and its use in many organizations has contributed to cyberspace’s exposure to many security threats. For instance, there is the dissemination of data through the internet and data storage in cloud storage. This sets up the information to threaten hackers and the disruption of systems through DDoS and malware attacks. All these threats contribute to the jeopardizing of the cyberspace systems and may lead to the ineffectiveness of the information systems (Masinde et al. 2017). Nevertheless, there are useful countermeasures that may be employed to protect businesses and individuals from all these cybersecurity threats. Cybersecurity refers to a set of protocols that are employed to maintain integrity, confidentiality, and availability. For instance, the use of updated antivirus software packages has been effective