“The Omega files: A true story”

Review the case facts associated with “The Omega files: A true story” (http://www.cnn.com/2000/TECH/computing/06/27/omega.files.idg/). Discuss which security controls would have helped avoid the breach and what steps the organization should implement to avoid a similar event in the future.

Sample Solution