Question: Recognizing that you do not have details of Microsoft's database, consider the types of vulnerabilities discussed in the lecture and readings, and then respond to

Recognizing that you do not have details of Microsoft's database, consider the types of vulnerabilities discussed in the lecture and readings, and then respond to the two questions below.
If you were the hacker, how might you exploit the vulnerabilities and compromise Microsofts database? Discuss 2 approaches you might take. For each approach, describe the Microsoft vulnerabilities that you would seek to exploit and why your hacking method therefore has a good chance of succeeding.
If you were the CISO of Microsoft, what could have you done to prevent this hacker's compromise of the database? In your response, discuss 3 steps that you as CISO would have taken, and whether each step should still be implemented post-breach.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!