Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.
Add 1 or 2 references in APA format. Should have 300-350 Words
â€¢Provide concrete examples, perhaps from your own experience or cited from the reading
â€¢ Identify consequences or implications
â€¢ Challenge something that has been posted â€“ perhaps by playing devilâ€™s advocate in a professional way
â€¢ Pose a related question or issue
â€¢ Suggest a different perspective or interpretation
â€¢ Pull in related information from other sources with proper citation â€“ books, articles, websites, courses, etc.