Research one of the following software security breaches:
(a) Summarize the event, what vulnerability(s) were exposed, the business impacts and discuss how to prevent such an attack (75%)
(b) Cite additional resources especially related to how to prevent these types of attacks. (5%)