Read the following scenario:
An employee, who had access to the highly-sensitive information stored on the organization’s intranet, has been terminated from your workplace. As the chief information security officer, you suspect that the employee plans to retaliate by hacking into the organization’s information systems.
Write a 1,400- to 1,750-word paper describing what the terminated employee may target, what methods they may use, and the damage their activities might cause to the IS. Include your preventive actions and responses as the chief information security officer.
Format your paper consistent with APA guidelines.
include intro and conclusion
when reference I need the chapter number and paragraph with at least 3 references