Suppose you are an information security officer for a consulting firm that implements, secures, investigates, and supports POS for small and medium retail businesses.Read the article If You Shopped at These 16 Stores in the Last Year, Your Data Might Have Been Stolen. Choose two stores from the list and use the Strayer University Library to research the specific attack or breach.
Write a 3–5 page paper in which you:
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:
The specific course learning outcome associated with this assignment is: