Question: Topic : Colonial Pipeline hacking attack. - What vulnerabilities existed in the technology that was compromised, and could they have been addressed? - Were there
Topic : Colonial Pipeline hacking attack.
- What vulnerabilities existed in the technology that was compromised, and could they have been addressed?
- Were there any individuals involved perhaps unhappy former employees, negligent employees, vendors, or service staff who had been compromised?
- What lessons are there for the organisation what did it do well or badly, how should it prepare for future threats?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
