CMGT 582 Week 4 Individual Assignment : Technologies and Methodologies Evaluation
Consider information management risks to include cybercrime and cyber-related crimes.
Write a 3-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards.
Include the following:
• PEN (penetration) Testing values and risks
• Social Engineering.
• BYOD threat probabilities.
Submit your assignment using the Assignment Files tab.
1 attachments —
Ask a question