Description
PART I: Select a cyber attack from a recent (within 2-3 years) reported event in the news and describe the method the attacker used, what was defeated (CIA-triad), as well as what technical countermeasures that could be put in place to mitigate that vulnerability in the future. Incorporate what you have learned about cybersecurity this term. 2 pages (or content).
PART II: Summarize Blockchain technology (i.e., how does it work?). Refer to the PDF posted in the reading section of this module. 2 pages (of content).
Sample Solution