Consider information management risks to include cybercrime and cyber-related crimes. Write a 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards.
Include the following: 1. Firewalls 2. Intrusion prevention systems 3. Intrusion detection systems 4. Access control 5. Cryptographic tools and processes
Include full referances and citations with introduction and conclusion.