Need help? We are here

Milestone1 Introduction Now that we have had an introduction to security protocols that will help reduce the risk of asecurityincident

Milestone
1 – Introduction
Now that we have had an introduction to security protocols that will help reduce the risk of a
security
incident we are going to study security
incidents.
Each student will select a recent security incident that had their data stolen by an outside attack, insider threat, or some other mechanism.
There are multiple examples that can be used,
i.e.,
Target,
Capital One, Home Depot, OPM,
etc.
As you
evaluate
the incident you evaluate several components throughout the remainder of the course.
The assignment will have a couple of milestones over the course with a culmination in week
16
of our final evaluation.
1.
select a security incident, there are examples above
2.
create a
1-page introduction of the security incident
3.
Your response must be properly APA formatted with every sentence that comes from another source cited or quoted.
4. The submission
will go through safe-assign to check for
plagiarism.
If a high level of
plagiarism
is detected this
will result in a zero for the assignment and the school will be notified.
5. There are no makeup attempts on any assignments
Below are some examples of security incidents that have occurred. You may choose any security incident that has occurred and impacted the users data.
https://cyware.com/category/breaches-and-incidents-news
https://www.cnet.com/how-to/equifax-words-with-friends-beyond-every-major-security-breach-and-data-hack-update/
https://www.cnbc.com/2019/07/30/five-of-the-biggest-data-breaches-ever.html
https://www.trendmicro.com/vinfo/us/security/special-report/data-breach/latest-incidents
https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html
https://www.washingtonpost.com/technology/2019/09/26/doordash-data-breach-affects-million-users/

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Scholar conversations are designed to be virtual discussions within groups. For this discussion students should start by watching this interview

Scholar conversations are designed to be virtual discussions within groups. For this discussion, students should start by watching this interview with Dr. Sara Maxwell, professor at UWB.Also, read this paper written by Dr. Maxwell. There will be a brief 5-question concept quiz about the reading directly after this discussion.https://youtu.be/bqyTaPofSpkDiscussion GuidelinesYou

Safety Assessments For SteviaNonnutritive sweeteners NNS have been suggested for use in connection with improving oral health diabetes care general

Safety Assessments For SteviaNon-nutritive sweeteners (NNS) have been suggested for use in connection with improving oral health, diabetes care, general reductions in caloric intake, and as anti-hypertensive agents etc.Over the years, many NNS (e.g. cyclamate, aspartame) have also been associated with public concern over safety. Sugar substitutes, low calorie sweeteners

Scenario Changing access controls can have some undesirable effects. Therefore it is important to carefully consider changes before making them

ScenarioChanging access controls can have some undesirable effects. Therefore, it is important to carefullyconsider changes before making them and provide mechanisms to reverse changes if they haveunexpected consequences.Always Fresh management has asked you to develop procedures for changing any access controls.The purpose of these procedures is to ensure that staff:?