Write an evaluation of security technologies and methodologies used to mitigate information management risks.

Consider information management risks to include cybercrime and cyber-related crimes.

Write a 3-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards.

Include the following:

  • Firewalls.
  • PEN (penetration) Testing values and risks
  • Social Engineering.
  • BYOD threat probabilities.