Question: If you were the hacker, how might you exploit the vulnerabilities and compromise Microsoft s database? Discuss 2 approaches you might take. For each approach,

If you were the hacker, how might you exploit the vulnerabilities and compromise Microsofts database? Discuss 2 approaches you might take. For each approach, describe the Microsoft vulnerabilities that you would seek to exploit and why your hacking method therefore has a good chance of succeeding.
If you were the CISO of Microsoft, what could have you done to prevent this hacker's compromise of the database? In your response, discuss 3 steps that you as CISO would have taken, and whether each step should still be implemented post-breach.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!