IT Control

Evaluate at least four (4) common cyber security threats using a minimum of four (4) IT controls and one (1) IT security framework. Research appropriate frameworks such as COBIT (Control Objectives for Information Technology) and the Committee of Sponsoring Organizations of the Treadway Commission (COSO) that assist with IT controls and their appropriate use to mitigate cyber security threats. Analyze the identified four (4) cyber security threats using the frameworks and four (4) IT controls on at least two (2) different operating systems by emulating their occurrence in a server environment.