Research the internet for an example of a violation of sensitive information (data breach). Post a summary of the situation and outcome (as well as the source) and evaluate if controls were adequate to prevent the violation. What would you have done to protect the organization from this type of exposure in the future?
The internet plays a significant function in our daily lives and more so in workplaces where research for requisite information is done almost daily. There is exploration of a variety of information about topics that are of interest to individuals and organization. The internet also is an avenue to various risk and threats. Such threats include security breaches like cyber-attacks and unauthorized access to vital information. This has been a challenge to many organizations and therefore this essay attempts to explain the mechanisms that can be employed to curb such effects in future.
Digital Streams series. Arrangement of numbers, lights and design elements on the subject of digital communications, data transfers and virtual reality