You are on page 1of 1

What was Taken?

Search for a few other examples of security breaches.


Document your findings in the table below.

Incident Affected What was What exploits How to prevent this Reference
date organization taken? were used? security breach? source

You might also like