emerging threats amp countermeas its 834 41 1
First milestone: There were multiple incidents that were chosen such as Target, OPM, Equifax, Home Depot, and so many more.
In the second milestone, you will access the administrative, physical, and technical controls of the particular company then determine which one of these administrative, physical, and technical controls were not secure and led to the security incident.
Based on first milestone, second milestone should be dependent.
Guidelines for follow :
Your paper must have a title and reference page, be submitted as a two page Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format. plagiarism should not be detected.