months. Your case study should include:
• When did the breach occur?
• Who was the target?
• Was it a threat or attack? i.e. What cyber-attack techniques were used, i.e. Man-in-theMiddle, XSS, phishing email, DDOS, Technical Hardware/Software Failures or Errors, etc.
• What was the likelihood level of this attack (i.e. what was the probability that a specific
vulnerability will be exploited)?
• What was the impact (consequences) of the breach?
• Who was responsible for the breach?
• What could have prevented or mitigated the consequences of the breach?
• Discuss the CIA model impact associated with it.