Operations security | Information Systems homework help
Refer: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-55r1.pdf Read the NIST documents that I provided and Chapter 12 in your text. Select one of the following types of breaches:1. A SQL Injection was performed by a hacker, resulting in the loss of PII data. 2. You have discovered a covert leak (exfiltration) of sensitive data to China. 3. Malcious code or malware was reported on multiple users’ systems. 4. Remote access […]