2 discussions 13
First Discussion (600 words) — not too informative
Read http://www.wired.com/2014/11/chip-n-pin-foreign-currency-vulnerability/
Discuss the importance of vulnerability assessment in Ethical Hacking. Why we should have a good understanding of the system vulnerability assessment summary in order to perform an effective ethical hacking?
Second Discussion (500 Words)
Discuss the creation of the Database structure:
Questions:
- What is the database structure?
- How many tables did you create?
- What SQL platform are you using?