Review the case facts associated with “The Omega files: A true story”
Discuss which security controls would have helped avoid the breach and what steps the organization should
implement to avoid a similar event in the future.
References:Gaudin, Sharon (2000). The Omega Files: A True Story. CNN.com. Retrieved from