Summarize the risks related to the use, processing, storage, and transmission of information or data Analyze sources of security breach that affected a lot of people and businesses Formulate solutions and proactive procedures in resolving security breach/es Develop set of policies and procedures to systematically manage the organization's sensitive data Design an innovate transmission, back-up procedure and secured filing system in case of security breach happens Apply set policies on securing data/information Evaluate applied policies based on feed-back and observation