Read the following scenario:
An employee, who had access to highly sensitive information stored on the organizations intranet, had been terminated from your workplace. Add the chief information security officer, you suspect that the employee plans to retaliate by hacking into the organizations information systems.
Write a 1400-1750 words paper describing what the terminated employee may target, what methods they may use, and the damage their activities might cause to the information system. Include your preventive actions and responses add the chief information security officer.
Format your paper consistent with APA guidelines.
Provide at least three scholarly references, i.e. not wiki, college times, etc..
Less than 10% plagiarism