Key Assignment Draft As is true with all components in any computing environment, security considerations are paramount for operating systems as well. Performing risk assessments and identifying mitig

IP4 Rubric Identify the risk linkage to your enterprise 5 Identify the mitigation linkage to your enterprise 5 Discuss the risk assessment 5 Technical Provide a description of the areas of an operating system that should be evaluated for performing a risk assessment 5 Provide a thorough description of risk 1 that pertains to your selected operating system solution 8 Provide a thorough description of risk 2 that pertains to your selected operating system solution 8 Provide a thorough description of risk 3 that pertains to your selected operating system solution 8 Provide a thorough description of risk 4 that pertains to your selected operating system solution 8 Provide a thorough description of risk 5 that pertains to your selected operating system solution 8 Provide a thorough description of the mitigation of risk 1 8 Provide a thorough description of the mitigation of risk 2 8 Provide a thorough description of the mitigation of risk 3 8 Provide a thorough description of the mitigation of risk 4 8 Provide a thorough description of the mitigation of risk 5 8 Update the previously completed sections based on instructor feedback. 5 Include new content (2-3 pages.) 5 Going beyond 10 Grammar, spelling, punctuation, and format are correct and professional.

No misspelled words 5 Writing is grammatically correct 5 Writing is clear and concise 5 Writing is focused and on-topic for the assignment 5 The post includes at least 1 reference to research sources 5 All sources are cited using APA format 5