Question: Module 1 Discussion Question
Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion within the past 5 years? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion?You must write about a real-life network/system attack that you found through your internet research. Failure to discuss a targeted attack and cite/reference the news source will result in a 0 for this entire discussion.
Instructions:
- For each discussion, you are required to write an initial post (300 words) and one secondary post (200 words) (I attached the post that needs a response post below). The discussion forums will be worth 40 points apiece—30 points for the initial post and 10 points for the secondary post. For your initial post, you must have two (2) academic peer-reviewed articles for references. References must be current within the last 5 years or points will be deducted.
- All discussions must be completed on-time and must include in-text citations and references in APA style formatting. If you do not use in-text citations or they are not in APA format you will lose points. If you do not have references or if they are not in APA format, you will lose points.
- You will lose 10% based on word count if your posts are too short.
- Work must be original.


0 comments