University Security Breach

Discuss the ramifications of the event, what might be the vulnerabilities that were exploited, regulatory and compliance issues associated with the event and what, if you were the CISO would be your recommended course/courses of action to ensure this type of incident did not happen in the future. Please remember to cite your sources.

Describe what you learned. How could you use this model to help improve cyber security in an organization? Please discuss in detail.

 

 

 

 

 

 

 

 

 

 

Sample Solution

ACED ESSAYS