Information Systems

    In 250 words or more, answer the following.

     

    Choose one of the following to respond to. Be sure to indicate which one you are addressing in your response.

    • Pick an example of a potential vulnerability when you might be willing to hire, or accept, a gray hat. This may include “bug bounties.” If you believe you would never use a gray hat, explain why and the alternative you might pursue.
    • Discuss no less than three motivations for hacking. How can understanding motivation help one develop a strategy for defending against such threats?

                                                                                                                                      Order Now