Summarize the risks related to the use, processing, storage, and transmission of information or data
Analyze sources of security breach that affected a lot of people and businesses
Formulate solutions and proactive procedures in resolving security breach/es
Develop set of policies and procedures to systematically manage the organization's sensitive data
Design an innovate transmission, back-up procedure and secured filing system in case of security breach happens
Apply set policies on securing data/information
Evaluate applied policies based on feed-back and observation
- Teacher: Gene Rose Sabudin