Using the attached article draft a two-page paper addressing the following.
- Briefly describe the threat (or attack).
- Briefly describe the type of e-commerce.
- Could the threat have been prevented by utilizing the steps of the security life cycle model? Why, or why not?
- Does the e-commerce sacrifice any form of customer service by implementing security measures? Explain.
https://www.nytimes.com/2016/09/23/technology/yahoo-hackers.html?_r=0