Please confer with a course mentor before working further on the assessment. The submission presented a general overview of techniques that can be acquired about Apple with an overview of general risks. Revision is required including a more comprehensive analysis of techniques that can be used to acquire information, specific attacks that can be targeted, countermeasures and threats to the organization's web environment.