Write a 3- to 4-page evaluation of security technologies and methodologies used to mitigate information management risks. Define the following technologies and discuss how you would implement these in a company.
- Firewalls
- Intrusion prevention systems
- Intrusion detection systems
- Access control
- Cryptographic tools and processes