You are a senior-level employee and you must tailor your deliverables to suit your audience: the leadership of the organization. You may choose to use a fictitious
organization, or model your organization on an existing organization, including proper citations. Leadership is not familiar with the architecture of the IT systems,
nor are they familiar with the types of threats that are likely or the security mechanisms in place to ward off those threats. You will provide this information in
tabular format. Before you begin, select the links below to review some material on information security. These resources will help you complete the network security
and vulnerability threat table. LAN security Availability Now you’re ready to create your table. Include and define the following components of security in the
architecture of your organization, and explain if threats to these components are likely, or unlikely: LAN security identity management physical security personal
security availability privacy Next, review the different types of cyberattacks described in the following resource: cyberattacks. As you’re reading take note of which
attacks are most likely to affect your organization. Then list the security defenses you employ in your organization to mitigate these types of attacks. Include this
information in your Network Security and Vulnerability Threat Table. f