Reference no: EM132205717 , Length: 5
Information Systems
Your annotated bibliography provided you with an opportunity to see what threats related to information security are current and relevant to your own special interests. Your next step is to identify a security breach and research how it happened, what happened, what the response was, and what you would recommend to protect the victim from future threats.
Topic: Choose a major security and privacy breach within the last two years.
Introduce the players within the breach, describe the general scenario and provide a brief summary.
Research the breach.
Discuss how the breach happened (consider the technical aspects and why the breach occurred)
Talk about what happened (consider privacy aspects involved)
Reveal what the response was.
Provide a critique or suggestions for a better response.
You may NOT pick the DNC breach which is the subject of the sample paper.
Information for your case study might utilize the Internet/Web, magazines and journals, books, reports, audiovisual sources, etc.
It should be 5-7 pages in length, double spaced, using an appropriate style manual, and submitted in PDF format.
Please choose a style manual (MLA guidelines, APA Guidelines or Chicago) and maintain consistency throughout your paper.