You have been hired by your employer, or a company you are familiar with, to manage its IT department. The CEO meets with you and asks you to prepare a report pointing out potential security vulnerabilities at the company.
Write a report discussing security vulnerabilities that can lead to the loss of confidentiality, integrity, availability, authenticity, or accountability.
Your well-written paper should meet the following requirements:
- 1- Be 2-3 pages in length, not including the title and reference pages.
- 2- Contain an illustrative table or a diagram created from properly cited external references.
- 3- Include two external references in addition to the textbook. (Computer Security- Principles and Practice, 3rd Edition) Use any Library to find your resources.
- Your paper must follow academic writing standards and APA style guidelines, citing references as appropriate.