ssume a scenario where the hackers gained access to informationthrough malware on Point-of-Sale (POS) systems of more than millioncredit and debit card. The firewall had captured the first malwarecode and an alert was issued which was ignored. The hackers starteddownloading the collected data. The cyber criminals have hacked thesystem to gain credit and debit card information. 1. Explain inyour own words what happened in the above discussed data breach. [5Marks] 2. Identify and experience the type of attack experienced inthe above scenario [2 Marks] 3. The stolen credentials alone arenot enough to access the company’s POS devices. What other meanscan the hackers acquire to allow them to navigate the company’snetwork and deploy the malware. [3 Marks] 4. What would havehackers done for privilege escalation? [2 Marks] 5. Theorganization admitted that they ignored many alerts from theirnetwork security devices because of alert overload. If you are theorganization’s Chief Technical Officer (CTO), what would you do toreduce the problem of alert overload? [3 Marks] 6. The securityexperts criticize the organization for failing to isolate sensitivesections of their networks from those more easily accessible tooutsiders. As a CTO, please propose a feasible solution to segmentand categorize your networks and resources. [5 Marks]