Problem
Domain: Security Engineering
Comparison and contrast discussion of multiple cyber breaches. What is similar what is different. How can you defend multiple types of attacks?
• Security Breach Comparison paper is due - comparing breaches
• Four pages
• Are there common themes?
• What common critical or potentially dangerous areas can you find?
• What are common protection measures that you can do?