Identify an organization, an important IT system

Identify an organization, an important IT system or application used within the organization, and potential security risks and threats to the system.

2- Building upon the work in Part 1, you will now investigate technologies, policies or practices that will help mitigate the security threats and risks that were identified in part I project.