1. Examine five advantages and five disadvantages of using white-hat hackers to discover vulnerabilities. Explain whether or not you would advise a business or organization to use this strategy.
2. Give your opinion on whether or not a midsized organization should outsource or insource the task of vulnerability assessment scanning. Explain your answer.
3. From the e-Activity, determine which of the SDL phases (Training, Requirements, Design, Implementation, Verification, Release, and Response) is the most critical for the development of secure systems. Explain why.
***e-Activity: Go to the Microsoft Security Development Lifecycle's (SDL) Website and read about the SDL, located at https://www.microsoft.com/security/sdl/default.aspx. ***
4. Determine whether developers should rely on tools to find security issues or perform manual testing. Support your position with an explanation.