Find an article on the Internet, outline a security breach or cyberattack

Find an article on the Internet, outline a security breach or cyberattack

Find an article on the Internet, outline a security breach or cyberattack.

Provide a link to the article and suggest a control that would mitigate against that attack.

Clearly explain why that control would be an effective mitigation strategy.