ANSWER EACH QUESTION IN DIFFERENT DOCUMENTS  QUESTION 1 While planning for secur

ANSWER EACH QUESTION IN DIFFERENT DOCUMENTS 
QUESTION 1
While planning for security, it is important to understand the various types of data breaches that organizations face. Review the Data Breach Reports that are linked below. Look for trends over the past four years.
Verizon Data Breach Investigations Report (DBIR) -http://www.verizonenterprise.com/verizon-insights-lab/dbir/, Data Breach Investigation Report – 2015, Data Breach Investigation Report – 2014, Data Breach Investigation Report – 2013, Data Breach Investigation Report – 2012
1. Watch the 3-minute video, Understanding the Real Risk of a Data Breach, by Verizon athttps://www.youtube.com/watch?v=wsdDC7DbgLE#t=86.
2. Summarize at least five major trends identified over the last three years.
3. Why should we care about looking at these trends?
4. Include your opinion on the trends. (e.g., Why they occurred? How to avoid? and etc.)
Submission Requirement: Citation Style: APA, Length: 2-3 pages (minus a cover sheet)
QUESTION 2
Browse the Special Publications (800 series) developed by the National Institute of Standards and Technology (NIST). Describe in general terms how some (maybe four or five) of the publications can help you plan for developing an information security program at your organization. (NIST Special Publications (800 Series) athttp://csrc.nist.gov/publications/PubsSPs.html)
Introduction that explains the purpose of the SP 800 series.
Name each publication that use select to describe.
Explain how the specific publication can assist you in planning.
Conclude the paper by writing your opinion of the usefulness of the documents to civilian organizations.
Submission Requirements: Citation Style: APA, Length: 1–2 pages (minus a cover sheet)