DISASTER RECOVERY
Discussion 1 TOPIC
Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion
INITIAL POST
A 250 word for initial post must be posted to the discussion forum.
Secondary POST
Please write a response to below answer for 200 words: