Information Governance and Cyber Security
1
, Table of Contents
Part A..........................................................................................................................................3
Task 1: Information Governance Need & Cyber Security Threats........................................3
Task 2: Framework.................................................................................................................5
Task 3: Risk Assessment......................................................................................................10
References................................................................................................................................14
List of figures
Figure 1: Security framework.....................................................................................................6
Figure 2: Types of control'.........................................................................................................8
List of tables
Table 1: Controls........................................................................................................................9
Table 2: Risk matrix.................................................................................................................12
2
1
, Table of Contents
Part A..........................................................................................................................................3
Task 1: Information Governance Need & Cyber Security Threats........................................3
Task 2: Framework.................................................................................................................5
Task 3: Risk Assessment......................................................................................................10
References................................................................................................................................14
List of figures
Figure 1: Security framework.....................................................................................................6
Figure 2: Types of control'.........................................................................................................8
List of tables
Table 1: Controls........................................................................................................................9
Table 2: Risk matrix.................................................................................................................12
2