Research social media platform ethics in decision concepts and address the following: Do you agree that ethics should be applied to social networking BI? Why or why not?
Conduct a Vulnerability Analysis for A commonly occurred SQL Injection Attack, the intent of the attack was to take out a whole network
Conduct a Vulnerability Analysis for A commonly occurred SQL Injection Attack, the intent of the attack was to take out a whole network