Information Systems

Emerging threats

Now that we have had an introduction to security protocols that will help reduce the risk of a security incident we are going to study security incidents.  Each student will select a recent security incident that had their data stolen by an outside attack, insider threat, or some other mechanism.  There are multiple examples that can be used, i.e., Target, Capital One, Home Depot, OPM, etc.  As you evaluate the incident you evaluate several components throughout the remainder of the course.  

1. select our incident

2. create a 1-page introduction of the security incident

3. Your response must be properly APA formatted with every sentence that comes from another source cited or quoted.