Information Systems

In 250 words or more, answer the following.

 

Choose one of the following to respond to. Be sure to indicate which one you are addressing in your response.

  • Pick an example of a potential vulnerability when you might be willing to hire, or accept, a gray hat. This may include “bug bounties.” If you believe you would never use a gray hat, explain why and the alternative you might pursue.
  • Discuss no less than three motivations for hacking. How can understanding motivation help one develop a strategy for defending against such threats?