system intrusion

1. Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion. (Min 150 words with 1 reference)

2.  Search “scholar.google.com” for a company or school that has defined the role of end-users in the creation of a contingency plan. Discuss why it is (or is not) important to include end users in the process of creating the contingency plan? What are the possible pitfalls of end user inclusion? (Min 150 words with 1 reference)

 
ORDER THIS PAPER OR A SIMILAR ONE WITH PRO WRITING TUTORS AND GET AN AMAZING DISCOUNT"