Search “scholar.google.com” for a company, school, or person that has been the target of a network within the past 5 years
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in place to protect against the intrusion.
- All discussions must be completed on time and must include in-text citations and references in APA style formatting. Missing citations or references will deduct 5 points from your score. All references must be recent within the past 5 years.