Evaluate the effectiveness of an organization’s mobile security plan

Risk assessment does not just include infrastructure. Risks can also include technological challenges, such as network and data vulnerabilities, which were evident when the Federal Government’s OPM personnel data was stolen.

Create a Microsoft® PowerPoint® presentation addressing the following:

Describe and provide an example of the terms information, cyber, and computer security. Explain the differences between the terms.
Identify and provide an example of the steps to evaluate the effectiveness of an organization’s mobile security plan.
Contrast and provide an example of cyberwarfare and cyberterrorism