This assignment involves an evaluation of a secure design. Using the materials from your reading assignment, perform a security evaluation on the fictitious organization in the case study attached to this assignment. Use SCORE, PCI, or CIS assessment methodology from your reading for your evaluation. Please use this week’s discussion forum to post any questions or comments you have about this assignment.
NOTE: no plagiarism