E4: SECURITY BREACHES: COMPARE & CONTRAST INSTRUCTIONS: Investigate the followin

Important - Read this before proceeding

These instructions reflect a task our writers previously completed for another student. Should you require assistance with the same assignment, please submit your homework details to our writers’ platform. This will ensure you receive an original paper, you can submit as your own. For further guidance, visit our ‘How It Works’ page.

E4: SECURITY BREACHES: COMPARE & CONTRAST
INSTRUCTIONS:
Investigate the following security breaches (please explore other web sources as needed, these links are just to get you started):
1. Colonial Pipeline: https://www.bloomberg.com/news/articles/2021-06-04/hackers-breached-colonial-pipeline-using-compromised-passwordLinks to an external site.
2. SolarWinds/Government: https://www.scientificamerican.com/article/giant-u-s-computer-security-breach-exploited-very-common-software/Links to an external site.
3. Equifax: https://www.csoonline.com/article/3444488/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.htmlLinks to an external site.
4. Target: https://www.bankinfosecurity.com/target-breach-what-happened-a-6312Links to an external site.
REQUIRED:
Write a short analysis of these security breaches.
Compare (what did they have in common?) and contrast (how were they different?) how the breaches occurred and the damage that was done (estimated cost?).
What advice would you give to the CEO or Board of Directors of each company?
Please input your response to Canvas.

Leave a Comment