dentify the information assets that exist in your organization, in the company selected in the week 2 assignment, or in a specific department within your organization or that company.
Identify potential risks to those information assets.
Create a Risk Register for this information. Use the format noted in table 16.5 in Computer Security. Principles and Practice Chapter 16: IT Security Management and Risk Assessment. The register should include at least 20 different assets.
Write a 3-…
