IWU Computer Science Mitigation Strategy Paper
Description
Instructions
- Phase 2 of Final Project: Provide a comprehensive mitigation strategy based on the threat analysis done in Assignment 2.4.
- As mentioned in Assignment 2.4, you may use a fictitious company, one that you researched on the Internet, or your own workplace (with an alias used for the company name).
- Conduct Internet research for formats that are used for developing and categorizing a security mitigation strategy.
- Include a short executive summary for this assignment, which you will revise later for use in the final paper.
- The mitigation strategy should be approximately 4 to 5 pages in length, in APA format, and double-spaced for the narrative.
- You may use tables or other graphic representations; however, these additions to the paper should not be included in the page count.
- The paper should include references to any material used in preparing the paper. You should use online resources to develop your plans; just make sure to cite these sources. All written work should be your own.
- Consider using Grammarly before you submit your paper. Grammarly checks grammar, provides suggestions for corrections, and reviews references.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."