For the purposes of this exercise, assume you are working as a security analyst at the fictional

Posted Date: