Threat Analysis 2

 

  1. Provide a comprehensive mitigation strategy based on the threat analysis done in Threat Analysis
  2. As mentioned in Threat Analysis, you may use a fictitious company, one that you researched on the Internet, or your own workplace (with an alias used for the company name).
  3. Conduct Internet research for formats that are used for developing and categorizing a security mitigation strategy.
    1. Include a short executive summary for this assignment, which you will revise later for use in the final paper.
    2. The mitigation strategy should be approximately 4 to 5 pages in length, in APA format, and double-spaced for the narrative.
    3. You may use tables or other graphic representations; however, these additions to the paper should not be included in the page count.
    4. The paper should include references to any material used in preparing the paper. You should use online resources to develop your plans; just make sure to cite these sources.