Devise a Security Policy
Think about a business you are familiar with that uses networks and computers to support business functions. Create a list of 10 important, specific items. The list might contain items such as the following:
Components — Servers, computers, mobile devices, IoT devices, other equipment, etc.
Information — Sales data, client data, financial data, etc.
Network configuration
Identify the threats these important items are subject to. Devise a security policy to mitigate that threat. Document your analysis process. Note that this information will be useful moving forward, so develop it fully at this time.