Published by at March 26, 2022 Table of ContentsCHAPTER 13Introduction3Background.3Significance of the study4Theoretical Foundations5Researcher’s Positionality8Purpose of the Study9Research Questions10Definition of the Terms10A.Cyber Security10B.Threats11C.Business Data11D.Attacks11E.Firewall11F.Authentication11G.Data Encryption11H.Hacker11I.Incident response plan12Summary and Organization of the Remainder […]