Consider the data flow octopus, as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.