question archive The purpose of this assignment is to allow you to examine the risks within the seven information technology (IT) domains and what law would be applicable for the scenario
Subject:Computer SciencePrice: Bought3
The purpose of this assignment is to allow you to examine the risks within the seven information technology (IT) domains and what law would be applicable for the scenario. This also reinforces the CIA triad of protecting information data for personnel and the organization.You are a security consultant hired by the CSU Medical Hospital to provide a security assessment report on the hospital's seven IT domains. Your report should include the following.
Use the following format for your report:
Your assignment must be at least two pages in length. You must use at least three sources for your assignment, two of which must be found in the CSU Online Library. Your assignment, including in-text citations and references, must be in APA style.
Question 2. Identify at least two vulnerabilities on your home computer and share them with your peers. Explain how you have/will mitigate those vulnerabilities.
Question 3. You are a risk management coordinator hired to help the company maintain compliance with laws and regulations. As the coordinator, you are tasked to ensure that the five fundamental components of the IT risk management plan are documented in the plan. Which of the five fundamental components do you think would be the most difficult to document? Why? Defend your answer.