Your boss received an email from a stranger Mr. H. yesterday. Mr. H. claimed that he discovered a loophole in your system that may allow hackers to disrupt the firm’s operations and leak customer data. Mr. H. proposed that he was capable to solve the security problem if your firm paid him reasonably. Your boss asked you to hold a short meeting with some of the key executives to discuss the system security issue of your firm. You will briefly explain the following aspects in the meeting:
Your boss received an email from a stranger Mr. H. yesterday. Mr. H. claimed that he discovered a loophole in your system that may allow hackers to disrupt the firm’s operations and leak customer data. Mr. H. proposed that he was capable to solve the security problem if your firm paid him reasonably.
Your boss asked you to hold a short meeting with some of the key executives to discuss the system security issue of your firm. You will briefly explain the following aspects in the meeting:
a) Describe five possible destructive hacker activities.
b) Suggest five tools or
c) What is the nature of Mr. H.? What immediate action(s) should your firm take after receiving the email from Mr. H.
Step by step
Solved in 4 steps