Discussion Question
1. Find an article on the Internet and outline a security breach or cyber attack. Provide a link to the article and suggest a control that would mitigate against that attack.
2. Clearly explain why that control would be an effective mitigation strategy.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.