Please read and follow the instructions bellow. Complete all

Please read and follow the instructions bellow. Complete all 3 steps!Introduction: Information, cyber, and security threats are a growing concern in the security industry. Contact a local business, institution or organization and obtain permission to review their internal policies or procedures for defense against such threats.Directions: Complete the following practical application and submit your results.1. Analyze the current information security, computer security, andcyber security protection strategies implemented in a local business,institution, or organization and estimate their level of penetration orcompromise, based on their internal policies and procedures.2. Research a local business, institution, or organization near you andobtain permission from the manager, owner, security officer, or computerinformation officer (CIO), to assess their cyber security using theattached Cyber Security Control Checklist3. Next prepare a short reflective journal to discuss your findings andrecommendations for correcting any deficiencies identified. INCLUDE PICTURES!