Assignment: Information Technology Cyber Security
1. Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization. Write a 2-page paper on three or four of the most important suggestions from the plan you select.
2. How are authentication and authorization alike and how are they different? What is the relationship, if any, between the two?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.