• Identify and select appropriate technologies to protect against the risks that were identified, and provide an explanation as to why the technology was chosen.
- Describe where you plan to place these technologies within the network and why.
o The plan should cover all layers of the OSI model.
- Identify additional software that will be required to monitor the network and protect key assets.
- Identify any security controls that need to be implemented to assist in mitigating risks.
• Mitigate all of the risks that were identified during the assessment phase.