a) Analyze the attack approach. b) What vulnerabilities were exploited? c) What information did the company lose in the attack? d) Suggest at least two ways the company might have prevented some of the information theft. article to make reference : https://www.wrc.noaa.gov/wrso/security_guide/case1.htm#Case%201