Write a research paper (about 10 to 12 double spaced pages) based on your research and analysis of an organization of your choice.
1. Identify an organization (enterprise or small-medium business). Assess the security vulnerabilities of the organization's computing systems along with the techniques used to protect them.
2. Consider a breadth of technologies such as intrusion prevention systems, access control, policy, data protection, encryption, authentication, software assurance, and other related cybersecurity concepts.