.For this module, you will provide an analysis of how cyber vulnerability audits need to be developed and how they need to be executed and supported by upper management (C-Suite) in order to meet corporate goals.
In addition, the discussion on hacker vs accepted “normal” security approaches should be compared and contrasted.In a 3-5 page paper, address the following:Based on the resources presented in the module, what would you consider to be optimal cyber auditing principles? What elements should be included in a cyber audit?
Compare and contrast “normal” security approaches with the use of hackers to identify and assess vulnerabilities within your cyber infrastructure.
Your analysis must include a minimum of two reputable references to support your position and be formatted according to APA requirements, including Times New Roman, 12-point font and proper citations. (*See the APA Resources link on the left-hand navigation for APA style guide resource
Requirements: 3-5 pages