Compare between the RM and NIST framework by mapping the steps of the RM to the functions of NIST framework?

Compare between the RM and NIST framework by mapping the steps of the RM to the functions of NIST framework?
Hint 1: use a table or diagram.
Hint 2: steps or functions can be combined to match each other’s.
Activity 3-
Consider again the case study provided in workshop 1 (please find it below for ease of access).
Alice runs a money transfer business in Australia (like Western Union) called Ezy Transfer. Customers can either send money online via Alice’s company website or they can-do walk-in transactions.
In workshop 1, you have identified the type of security risks Ezy Transfer is subject to. Using the RM framework, which was covered in Week 2, or the NIST framework, which was covered in this workshop, do a brief security management plan for Ezy Transfer.