Objective 6

Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

This is a research document about a famous cyber attack that taught many lessons within the Information Security domain. 

Here is the presentation material I created for the above report.