Disaster Recovery / An Overview Of Information Security And Risk Management

Question:

Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion within the past 5 years? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion?

 you are required to write an initial post (300 words) and one secondary post (200 words). For your initial post, you must have two (2) academic peer-reviewed articles for references. References must be current within the last 5 years.must include in-text citations and references in APA style formatting.