Embed presentation
Download to read offline



The document outlines a task to create a table in Microsoft Word that identifies at least six different security threats to data categorized by type (data-at-rest, data-in-transit, or processing) and their impact on confidentiality, integrity, and availability. It requires detailing each threat, identifying the affected data types, and providing mitigation suggestions. Additionally, a short paragraph discussing two access control techniques or policies along with APA-formatted citations must be included.


