Security breaches are in the news all the time. Document a recent hack involving the theft of employee information or customer data. Suggest ways the attack could have been avoided.
What will be an ideal response?
Sadly, the news is full just about every day with reports of major data breaches. Students can use popular media sources that summarize security vulnerabilities from a consumer point of view. Technical articles can provide supplementary information on the detailed nature of the attacks.
Advice on how to prevent attacks is easily accessible. The problem is implementing the suggestions solutions across the enterprise. Students should identify why some types of security breaches seem to occur repeatedly. For example, organizations failing to patch known vulnerabilities in the operating system leave themselves open to attack.
You might also like to view...
The mysql_fetch_row() function returns the ____________________ in the current row.
Fill in the blank(s) with the appropriate word(s).
A class cannot have a constructor with default parameters.
Answer the following statement true (T) or false (F)
The type vector provides the expression ____________________, which returns the last element of the object.
Fill in the blank(s) with the appropriate word(s).
Intangible benefits are not physical, but can be measured and expressed in financial terms.
Answer the following statement true (T) or false (F)