Running head:Threats to Information SecurityThreats to Information SecurityDonald ShipmanCIS 502Prof. AdebiayeApril 29, 2012What are the key threats to information security outlined in the article, and what steps canbusinesses take tomitigate these risks? Discuss deliberate software attacks, technologicalobsolescence, and prevention strategies, including both administrative and technical measures.Word count requirement:500-600 words
Page 2
Preview Mode
This document has 6 pages. Sign in to access the full document!