You have been asked to help secure the information system and users against hacking attempts. Complete the following:
Take this opportunity to list 2 different approaches and techniques a hacker would use to steal the organization's data.
For each approach, discuss what methods can be used to circumvent the attack, prevent it, or minimize the disruption caused by the event.
Include 1-2 pages of details.