ISM542 Task 2
Task:
In order to develop a thorough plan to manage risks to your information system, you need to think about outside risks to networks, hardware, and software. This also includes perimeter protection and continuous monitoring and security operations.
This module’s task will be to make a chart to show all risks to the information system including from inside or outside the system, to hardware and software, and to the network, level of risk, and possible solutions that could be instituted digitally, physically or through policy.
Note: Think of this as you are presenting this proposal to someone who has zero knowledge about this matter, so when proposing solution please explain what it does.