Network Security Breaches

profileCyberG

 Learning Objectives and Outcomes

  • Identify and describe real-world, high-profile network security breaches.

Assignment RequirementsYou are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, said the company has a new potential client. Acme e-Goods is a well-known outfit that markets its products over the Internet. The company has a large-scale network that houses a great amount of sensitive customer information they want to protect.Acme e-Goods is seeking proposals from private forensic firms. The company is considering keeping a firm on retainer that could immediately respond to any network security incidents.Chris has a number of people involved in preparing DigiFirm's proposal and wants you to get involved. He wants you to find examples of actual high-profile network security breaches that have occurred so DigiFrim can show Acme e-Goods just how common network security breaches are becoming, and that Acme is not immune.
For this assignment:

  1. Search for examples of high-profile network security breaches. You can use the regular press, technology- or security-specific sources, or generic white papers from security firms or professional associations.
  2. Write a report that describes three of these incidents. Include the following information:
    • The organization that was targeted
    • The nature of the breach
    • The impact of the incident
    • The resolution, if any

Required Resources

  • Course textbook
  • Internet access

Submission RequirementsFormat:Microsoft WordFont:Arial, size 12, double-spaceCitation Style:Follow your school's preferred style guideLength:1-2 page
Self-Assessment Checklist

  • I searched for examples of high-profile network security breaches.
  • I wrote a report that describes three of these incidents, including the organization that was targeted, the nature of the breach, the impact of the incident, and the resolution, if any.
  • I organized the information appropriately and clearly.
  • I created a professional, well-developed report with proper documentation grammar, spelling, and punctuation.
    • 3 years ago
    • 10
    Answer(1)

    Purchase the answer to view it

    blurred-text
    • attachment
      document31.pdf
    • attachment
      security.edited.docx