1. Find an article on the internet outline a security breach or cyberattack. Provide a link to the article and suggest a control that would mitigate against that attack. Clearly explain why that control would be an effective mitigation strategy.
2. Describe how you do or could use operations security in your current job If you are currently unemployed, define the job you are looking to apply for and how you would use operation security in that job position 500-700 words.