course name its 834 41 emerging threats amp counterman

security protocols that will help reduce the risk of a security incident we are going to study security incidents. Each student will select a recent security incident that had their data stolen by an outside attack, insider threat, or some other mechanism. There are multiple examples that can be used, i.e., Target, Capital One, Home Depot, OPM, etc. As you evaluate the incident you evaluate several components throughout the remainder of the course. The assignment will have a couple of milestones over the course with a culmination in week 16 of our final evaluation.

Don't use plagiarized sources. Get Your Custom Essay on
course name its 834 41 emerging threats amp counterman
Just from $13/Page
Order Now

1. select our incident

2. create a 1-page introduction of the security incident

3. Your response must be properly APA formatted with every sentence that comes from another source cited or quoted.

4. The submission will go through safe-assign to check for plagiarism. If a high level of plagiarism is detected this will result in a zero for the assignment and the school will be notified.