Evaluate how supply chain management systems, enterprise resource planning systems, and customer relationship management systems are currently used, or could be used, within the organization.
Evaluate how a database management system and a data warehouse are currently used, or could be used, within the organization.
Evaluate measures that the organization takes, or could take, to ensure information is protected and free from security vulnerabilities.