Please provide answer for the below question
PART 1: Ethical Hacking
Discuss in 500 words or more Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.
PART 2: Ethical Hacking
Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 3 paragraphs in length and uploaded as a TEXT DOCUMENT. What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words. A reference citation is also required for this assignment. You may just include a link to your article.
Below is an EXAMPLE to show you the format requirements?
Article Title: Could a Cyber Attack Knock Out Your Computer?
Reference:
https://www.lifewire.com/cyber-attacks-4147067
Cyber-attacks disguise themselves in a variety of ways ranging from email messages that appear to be sent from a person in your contacts list, to malicious files sent as attachments from a familiar source such as your bank or other businesses you frequent. Understanding what not to do may be just as important as what to do when these events occur.
In the event of a successful cyber-attack, the attacker may demand some form of ransom payment to regain access to your files that have either been compromised or stolen. Releasing control is usually requested in the form of cryptocurrency which is much more difficult to track.
Downloading apps from unknown developers, opening files from random email sources, visiting infected web sites, or clicking on links that are unfamiliar to you may all be ways you are lured in and cause you to be more vulnerable to attacks.
The best way to protect yourself is to be keenly aware as you search the web or read through your email messages. Training yourself to spot a potential attack is your best defense and the the best way to protect yourself from cyber-attacks.