Create a 2-page table in Microsoft Word identifying a minimum of 6 threats using the column headers and
Threat to Type of Data
Within your table:
Identify relevant threats. List 1 per column.
Determine the type of data threatened (data-at-rest, data-in-transit, or processing). Identify the data type in the
Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
Describe the mitigation plan in 2 to 3 sentences in the column.
Threat: Password Compromise
Threat to Type of Data: Data-At-Rest
Confidentiality/Integrity/Availability: C & I
Mitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it
down on sticky notes on your desk.
Include a short paragraph that highlights 2 access control techniques or policies that enforce security.
Cite at least 2 resources to support your assignment.
Format your assignment according to APA guidelines.
PART 2 — Discussion Topic
Emma won a laptop at her high school science fair.
The laptop does not have antivirus software installed on it so Emma must purchase one.
Shell be using the laptop for college applications, schoolwork, and hopefully next year as a college freshman.
Respond to the following in 175 words:
What top 2 factors should Emma keep in mind before purchasing the software?
Why are these the top factors to consider?
Where should she make the purchase?