Good job in further expanding on the attack on Credit System Solutions. The breach, incidence description and discovery look good. The paper can improve to have a better flow and connection between the different sections. There are five red flags mentioned in the Logs. If these are based on references, please ensure to state where they come from and include the applicable references. Also, in the recommendations, please also include the human/policy side recommendations that you would provide. Also, expand on the implications of this incident for credit card processing company' s as a whole.
Get Free Quote!
343 Experts Online