Answer the following questions: 1. Search the Web for two or more sites that d

Answer the following questions:

1. Search the Web for two or more sites that d

Answer the following questions:
1. Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components of security management can be adapted for use in the security management model?
2. Using the components of risk assessment documentation presented in the Security Maintenance presentation, draft a tentative risk assessment of either the computer lab that we use for our class in MDC or your home computer set up.Outline the critical risks you found and provide a summary of your findings.