Explain whether or not you believe databases are an attractive target for hackers and why. Analyze the common database challenges that exist for the enterprise that may not be relevant for small and medium-sized business (SMBs) and why these challenges exist. Justify your answer.
- From the second e-Activity, summarize the attack you researched. Determine why and how the attack was accomplished and how it circumvented the security controls of those attacked.
- Use the Internet or the Strayer Library to research a recent and successful attack on a Web server and / or database. Be prepared to discuss