Overview: This case study analysis is the first of two formative tasks that will support your understanding of the key course concepts of human behaviors that could potentially cause a security threat. These case study analyses will inform your approach for the milestone tasks and the final project.
Prompt: Identify three current security breaches. Using presentation software, create a slide for each of the breaches. In addition to indicating when each breach occurred, address the following critical elements on each slide:
- The data that wascompromised
- What is being done to mitigate futureoccurrences
Guidelines for Submission: Include a title slide. Include at least one slide for each of the three breaches. Include all of the critical elements for each breach. On each slide, use the commenting feature to describe each breach in two to three paragraphs.
Need assignment help for this question?
If you need assistance with writing your essay, we are ready to help you!
Why Choose Us: Cost-efficiency, Plagiarism free, Money Back Guarantee, On-time Delivery, Total Сonfidentiality, 24/7 Support, 100% originality
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions.
|Critical Elements||Proficient (100%)||Needs Improvement (75%)||Not Evident (0%)||Value|
|Compromised Data||Accurately describes the data that was compromised||Does not sufficiently describe the data that was compromised||Does not describe the data that was compromised||15|
|Individuals and Organizations||Accurately and sufficiently describes the individuals and organizations that were impacted||Does not sufficiently describe the individuals and organizations that were impacted||Does not describe the individuals and organizations that were impacted||20|
|Human Factors and Suspects||Accurately and sufficiently assesses the human factors that impacted the breach and indicates whether the suspects were identified||Does not sufficiently assess the humanfactors that impacted the breach or indicate whether the suspects wereidentified||Does not assess the human factors that impacted the breach or indicate whether thesuspects were identified||20|
|Mitigation Efforts||Sufficiently provides concrete examples of the efforts being undertaken to mitigate future occurrences||Does not sufficiently provide concrete examples of the efforts being undertaken to mitigate future occurrences||Does not provide examples of the efforts being undertaken to mitigate future occurrences||20|
|Damage Control Measures||Accurately and sufficiently describes the damage control measures||Does not sufficiently describe the damage control measures||Does not describe the damage control measures||15|
|Articulation of Response||Submission has no major errors related to citations, grammar, spelling, syntax, or organization||Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas||Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas||10|