Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_terminologies.htm
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_skills.htm
https://www.youtube.com/watch?v=t2mRNxfHTjw&feature=emb_logo