Cybersecurity for Dummies

Joseph Carson of Thycotic, the author of the book “Cybersecurity for Dummies” wrote a free version of his text as a guide for the general public. The AICPA obviously had a specific target market for an article it published: “Top 20” article: Top 20 Cybersecurity Checklist for accountants. Compare what you learned in Carson’s text to the AICPA’s “Top 20” Cybersecurity Checklist.

See the correct hyperlink for the AICPA Checklist below (updated March 24, 2020):

Click to access top-22-cyber-checklist.pdf

Discuss similarities and differences between these two. Also consider approaches offered in 2018 SANS Security Awareness Report available online at SANS Institute.org.

Joseph Carson of Thycoti

c, the author of the book “Cybersecurity for Dummies” wrote a free version of

his text as a guide for the general public. The AICPA obviously had a specific target market for an article

it published: “Top 20” article: Top 20 Cybersecurity Checklist for ac

countants. Compare what you

learned in Carson’s text to the AICPA’s “Top 20” Cybersecurity Checklist.

See the correct hyperlink for the AICPA Checklist below (updated March 24, 2020):

https://www.aicpa.org/content/dam/aicpa/interestareas/privatecompanie

spracticesection/qualityservi

cesdelivery/informationtechnology/downloadabledocuments/top

22

cyber

checklist.pdf

Discuss similarities and differences between these two. Also consider approaches offered in 2018 SANS

Security Awareness Report available onli

ne at SANS Institute.org.

Joseph Carson of Thycotic, the author of the book “Cybersecurity for Dummies” wrote a free version of

his text as a guide for the general public. The AICPA obviously had a specific target market for an article

it published: “Top 20” article: Top 20 Cybersecurity Checklist for accountants. Compare what you

learned in Carson’s text to the AICPA’s “Top 20” Cybersecurity Checklist.

See the correct hyperlink for the AICPA Checklist below (updated March 24, 2020):

https://www.aicpa.org/content/dam/aicpa/interestareas/privatecompaniespracticesection/qualityservi

cesdelivery/informationtechnology/downloadabledocuments/top-22-cyber-checklist.pdf

Discuss similarities and differences between these two. Also consider approaches offered in 2018 SANS

Security Awareness Report available online at SANS Institute.org.

Reference no: EM132069492

GET HELP WITH YOUR PAPERS

WhatsApp
Hello! Need help with your assignments? We are here