2 discussions 13

First Discussion (600 words) — not too informative

Read http://www.wired.com/2014/11/chip-n-pin-foreign-currency-vulnerability/

Discuss the importance of vulnerability assessment in Ethical Hacking. Why we should have a good understanding of the system vulnerability assessment summary in order to perform an effective ethical hacking?

Second Discussion (500 Words)

Discuss the creation of the Database structure:

Questions:

  1. What is the database structure?
  2. How many tables did you create?
  3. What SQL platform are you using?