Use the table below to identify the cybersecurity breach assigned based on the first letter of your first name. For example, if your first name i
Follow these guidelines when completing each component of the discussion. Contact your course faculty if you have questions. General Instructions Use the table below to identify the cybersecurity breach assigned based on the first letter of your first name. For example, if your first name is Gilda then your assigned app is malware. Create a fictional…