Discussion Question
o Explain why ethical hacking is necessary in today's complex business environment.
o What is the weakest link in the security of an IT infrastructure? What are some of the strategies for reducing the risks?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.