Perform a search in Google or in the school’s online library database for four or five companies that have been victims of cloud-related security breaches AND/OR cloud providers that have been victims of security breaches.
Required:
Minimum 2500 words— (not including Title page, Abstract, Introduction, and Reference page). 500 words for each module mentioned below
Include:
I. Company Name—type of company—brief history—Industry—Customers (consumer, business, or both)
II. Type of threat
III. What or (who) caused the threat
IV. How the threat was discovered
V. How the threat was resolved
VI. Explain what and how you would have implemented to have prevented the intrusion. Use third person: eg. One may argue; It may be concluded.
VII. Known repercussions from the threat (monetary, reputation, brand, customer loss, etc).
Include:
· Title page
· Abstract
· Introduction (Do not include the actual word.)
· Conclusion
· Reference page
· Minimum 8 references which are scholarly articles of recent times (2015 over)—DO NOT USE Wikipedia!
· USE APA 7.All in-text citations must be represented on the Reference page
· All papers will be checked for plagiarism in SafeAssign—ONLY SafeAssign at or below 20% will be accepted