Read the list of suggested resources to find URLs for news stories and reports for your chosen topic. Then find 3 to 5 additional sources on your own. Each source MUST be authoritative and/or scholarly.
Review your selected resources to make sure that you have at least one article or paper that provides an answer for each of the major content items for your research paper:
1 identifying the type of breach
2 identifying and explaining how the breach occurred (or suspicions by authorities as to how it may have occurred)
3 identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems
4. identifying and discussing technological improvements that would help prevent recurrence.