Review the case facts associated with “The Omega files: A true story”
(http://www.cnn.com/2000/TECH/computing/06/27/omega.files.idg/).
—————————————————————————-
Discuss which security controls would have helped avoid the breach and what steps the organization should
implement to avoid a similar event in the future.
—————————————————————————
References:Gaudin, Sharon (2000). The Omega Files: A True Story. CNN.com. Retrieved from
https://www.cnn.com/2000/TECH/computing/06/27/omega.files.idg/
————————————————————————–
The post Facts associated with “The Omega files: A true story” first appeared on COMPLIANT PAPERS.