Provide a comprehensive mitigation strategy based on the threat analysis done in Assignment 2.4.
As mentioned in Assignment 2.4, you may use a fictitious company, one that you researched on the Internet, or your own workplace (with an alias used for the company name).
Conduct Internet research for formats that are used for developing and categorizing a security mitigation strategy.