Tech companies prepare for cyberattacks using common cybersecurity

Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how you could implement that particular policy to prevent an attack:  1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.

https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_terminologies.htm

https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_skills.htm

https://www.youtube.com/watch?v=t2mRNxfHTjw&feature=emb_logo