2. Select an asset (location of breached information) and analyze what incidents created the breach, what vulnerabilities were exploited and what are you recommendations security measures should be in place.
Type of Assets:
Electronic Medical Record
It should include the following sections: Summary (what asset and period you are evaluating), Analysis of the Information (why the breaches ocurred)?, Recommendations (what entities can do to prevent from occurring again)