Explanation may include
- describing how the unintentional disclosure of personally identifiable information (PII) stemming from loss or theft of digital or printed information can be used to commit identity theft, tax fraud, medical and financial fraud, and theft
- describing how the compromise or disruption of business IT systems can result in a DoS attack, theft of IP, cyber extortion of business information, or a disruption of business service
- discussing forms of privacy violation and its consequences
- discussing phishing/skimming attacks and their consequences.
Process/Skill Questions:
- What are the public costs associated with litigation in cybersecurity cases?
- What are examples of relevant federal cases and associated verdicts or precedents?
- What were the causes and effects of the Equifax data breach?