Question: Recognizing that you do not have details of Microsoft's database, consider the types of vulnerabilities discussed in the lecture and readings, and then respond to
Recognizing that you do not have details of Microsoft's database, consider the types of vulnerabilities discussed in the lecture and readings, and then respond to the two questions below.
If you were the hacker, how might you exploit the vulnerabilities and compromise Microsofts database? Discuss approaches you might take. For each approach, describe the Microsoft vulnerabilities that you would seek to exploit and why your hacking method therefore has a good chance of succeeding.
If you were the CISO of Microsoft, what could have you done to prevent this hacker's compromise of the database? In your response, discuss steps that you as CISO would have taken, and whether each step should still be implemented postbreach.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
