First half page executive summary about company 150 words · You are an Information Technology (IT) intern · Health Network Inc. · Headquartered in Minneapolis, Minnesota · Two other locations · Portland Oregon · Arlington Virginia · Over 600 employees · $500 million USD annual revenue · Each location is near a data center · Managed by a third party vendor · Production centers located at the data centers · Second half page about product of our company 100 words ( change word, give different example in 3 products don’t use similar sentence. Health network’s Three products · HNetExchange · Handles secure electronic medical messages between · Large customers such as hospitals and · Small customers such as clinics · HNetPay · Web Portal to support secure payments · Accepts various payment methods · HNetConnect · Allows customers to find Doctors · Contains profiles of doctors, clinics and patients Second Page risk management plan about 300 words, Current risk management plan outdated, Your assignment is to create a new one, Additional threats may be found during re-evaluation, No budget has been set on the project, google and find recent threat weakness and vulnerabilities. Don’t use below fine new risk and how you can plan new risk assessment . · Loss of company data due to hardware being removed from production systems · Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops · Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on · Internet threats due to company products being accessible on the Internet · Insider threats · Changes in regulatory landscape that may impact operations Compliance Laws and Regulations <List the laws and regulations that affect this industry.> 150 words for above law Third task is table In column change below example and use it in below table with domain name and add risk factors Risks, Threats, and Vulnerabilities Unauthorized access from public Internet Hacker penetrates IT infrastructure Communication circuit outages Workstations Workstation operating system (OS) has a known software vulnerability Denial of service attack on organization’s e-mail Remote communications from home office Workstation browser has software vulnerability Weak ingress/egress traffic-filtering degrades performance Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse Need to prevent rogue users from unauthorized WLAN access User destroys data in application, deletes all files, and gains access to internal network Fire destroys primary data center Intraoffice employee romance gone bad Loss of production data server Unauthorized access to organization-owned workstations LAN server OS has a known software vulnerability User downloads an unknown e-mail attachment Service provider has a major network outage Us.