paper for information security and risk management

   After reviewing the slides for the conclusive article and / or listening to the disquisition, allay your conclusive article. Be infallible to employ what you keep skilled to the scenario Using APA format, transcribe the conclusive Lavish Skill Article for CarVend Sales Please pay vigilance to the SafeAssign charges. If the items highlighted are not proportioned the connectences, fabricate infallible you adduce your sources! The article must contain · Executive Summary · Overview of the gang · Explanation of the IT network (connect to the diagram in PPT) · Lavish Assessment · Identify property and Activities to be protected · Identity threats, vulnerabilities and exploits · Lavish Mitigation · BIA · BCP · DRP and CIRT · How your intent protects the gang overall OVERVIEW RELATED TO THIS PAPER  •Write article in sections •Understand the gang •Find homogeneous situations •Research and employ potential solutions •Research and furnish other issues Based on this knowledge you keep to do article: •You are an Knowledge Technology (IT) intern •CarVend Sales Inc.  •Specializes in online and vending machine sales of new and used cars •Headquartered in Seattle, Washington •Three other residuums •Portland Oregon •Phoenix, Arizona •Los Angeles, California •Over 1000 employees •$750 favorite USD annual revenue •Each residuum is close a basis center •Managed by a third party vendor •Production centers located at the basis centers. •CarVend Sales •Handles customer purchases, trades and returns •Online sales •Small car lots •CarVend Finance •Web Portal to capacitate customers for purchases  •Accepts uncertain reimbursement methods including something-due, praise cards and mortgage financing •CarVend Delivery •Vendors who consign cars to buyers homes •Vendors that consign to vending machines •Four corporate basis centers •Over 1000 basis severs •700 corporate laptops •Mobile devices such as tablets in vendor consigny trucks •Networked vending machines •Current lavish tribute was done promptly when the gang was rooted •Your assignment is to engender a new one •Additional threats may be root during re-evaluation •No budget has been set on the purpose. •Loss of gang basis due to hardware entity removed from product systems •Loss of gang knowledge on past or stolen gang-owned or vendor property, such as ductile devices and laptops •Loss of customers due to product outages caused by uncertain events, such as original disasters, fluctuate skill, transient software, and so on •Internet threats due to gang products entity liberal on the Internet •Insider threats •Changes in regulatory view that may collision operations