Organization: Target Risk Assessment
I. Write mainly the identification of relevant aspects of the Target computing and network infrastructure.
Note: Do not try to access more information through Social Engineering, or through attempted cyber attacks or intrusion attempts. This is a look at how readily available information might be used from a risk management perspective.
Required minimum 4 page