Step-By-Step Assignment Instructions Assignment Topic: How data breaches occur and are discovered. Setup instructions: Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches. Then pick 3 different types of data breaches and report on one data breach each.  The types are located on the left hand side. How to submit: Submit a summary of each data breach and answer the following questions in your response: What was the data breach? How was the data breach found out? What were the threats? What were the vulnerabilities and how did the threats interact with them? Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach? Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page.  In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission

Principles of Information Systems (MindTap Course List)
13th Edition
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter14: Ethical, Legal, And Social Issues Of Information Systems
Section: Chapter Questions
Problem 3WE
icon
Related questions
Question

Step-By-Step Assignment Instructions

Assignment Topic:

How data breaches occur and are discovered.

Setup instructions:

Go to https://www.privacyrights.org/data-breaches and review some of the information on data breaches.

Then pick 3 different types of data breaches and report on one data breach each.  The types are located on the left hand side.

How to submit:

Submit a summary of each data breach and answer the following questions in your response:

What was the data breach?

How was the data breach found out?

What were the threats?

What were the vulnerabilities and how did the threats interact with them?

Based on what you have learned in the course, what threats or vulnerabilities were present that caused the data breach?

Submissions must be submitted in rich text format. Each summary should be at least 2 paragraphs in length but not more than 1 page.  In other words, since you are reviewing 3 data breaches, you will have 6 paragraphs to 3 pages total for the overall submission.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Risks related to security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning