Question: From your Ciampa textbook, complete Project 1 - 1 & 1 - 2 SUBMIT YOUR ANSWERS IN A WORD DOCUMENT Security Awareness: Applying Practical Security

From your Ciampa textbook, complete Project 1-1 & 1-2 SUBMIT YOUR ANSWERS IN A WORD DOCUMENT
Security Awareness: Applying Practical Security in Your World
by Mark Ciampa 5th edition
Please note the websites have changed a bit since this book was published. Please follow along in the book and answer these revised questions
Project 1-1 Examine Data Breaches Textual.
Download the spreadsheet and use the filter feature in Excel to answer these questions (if you don't know how to use this feature, look at course resources):
Item 9 How many breaches pertaining to "MED" occurred in 2019(you will need to click on the Year of Breach tab and then select 2019). Report the actual number of organizations not records breached
Item 10- use different year (it seems that they only have med reports for 2019) indicate which year you used and the amount of breaches
Item 15 How many breaches that were made public pertain hacking (you will need to click on the Type of Organization" tab and select Hack and 2019).
Item 18- Select a different year and organization type that you are interested in. How many breaches were there in the category you selected? (Be sure to include what criteria selected-year and type of organization).
Project 1-2 Exam Data Breaches Visual
(You may need to refresh your browser for the filter to work properly)
Item 10 Who had the largest amount of breaches for hacks in retail in 2019(you will need to click on the Filter tab and then select the appropriate criteria.
Item 12 Who had the largest amount of breaches for hacks in financial for 2019(you will need to click on the Filter" tab and the appropriate criteria).
Item 15- Filter each of the different types of methods. Which method is the most common? Why do you think this is the case?
Item 16- answer as question in the textbook

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!