Complete the following using the course text, professional journal articles, or other reputable resources (NO WIKIPEDIA or BLOGS).
· Find a recent cybersecurity incident. A good resource for this may be the FBI, CERT, CISA, SANS, Verizon DataBreach reports and etc.
· Write an attack case study about the incident. Make sure to include all five steps listed in the text (Overview, Perpetrator, Attack Scenario, Risk Management, and References).
Paper Requirements:
· Format: Microsoft Word
· Font: Arial, 12-Point, Double-Space (or equivalent)
· Citation Style: APA or MLA (The point is to use a style that makes your document readable and give credit to the sources you used.)
Length Requirements:
· 2–3 pages
· Coversheet
· List of References Page.
· Proofread – Edit for spelling, grammar, punctuation, etc.
· Use only course text, professional journal articles, or other reputable resources.