discussion question 1364
1.)
Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion.
2.)
Search “scholar.google.com” for a company or school that has defined the role of end users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion?
Note:
Need minimum 800 words for each question.
Avoid plagiarism and content should be in APA format (mandatory)
Provide minimum 2 references for each question and those references must include at end of every answer accordingly.