Part I – Go online and find a case study about the implementation of an ERP or SCM system, or cloud migration
project. Was it successful? How long did it take? What were the issues? Does the case study tell you how much money the organization spent?
Part II – Describe how you apply the security triad (confidentiality, integrity, and accessibility) components in some area of your work life or personal life. For example, if you work at a bank, you might consider how you maintain confidentiality, integrity, and accessibility for one kind of data.