What is the weakest link in the security of an IT infrastructure? What are some of the strategies for reducing the risks?

Question Description

Question-1 : Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

Reference :1.https://resources.infosecinstitute.com/category/pen-testing-1/

2.https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

3.https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

4. https://www.youtube.com/watch?v=eNQycQwKV7Y&feature=youtu.be

Question-2 : What is the weakest link in the security of an IT infrastructure? What are some of the strategies for reducing the risks? An initial post must be between 250-300 words

Reference : Attached ppt