Operations Security Discussion
Find an article on the internet outline a security breach or cyber attack. Provide a link to the article and suggest a control that would mitigate against that attack. Clearly explain why that control would be an effective mitigation strategy.
Comment on someone else's post. Either agree or disagree with their suggest and provide a reason why you agree or disagree.
In your main post, thoroughly describe the attack and how it occurred. Also, if the article identifies a way to prevent the attack, also describe it in your main post.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.