This is week 4 Discussion post
Research a recent (within the last two years) specific case, or speak from your own personal or professional experience, of a significant security breach that involved compromising a network or host firewall implementation in a computing environment.
Discuss the following:
- Attack vectors and techniques used to carry out the attack.
- Probable motivation of the attacker.
- How the incident was detected.
- Steps taken to mitigate the effects of the attack.
Requirements: well, explanatory

Leave a Reply
You must be logged in to post a comment.