What limitations might an analyst encounter through the use of efficient analysis on a Military Operation who has had a history of hacking and unauthorized penetration?

Anyone of the topics

1 What limitations might an analyst encounter through the use of efficient analysis on a Military Operation who has had a history of hacking and unauthorized penetration?

2. How can computer engineers educate decision makers on the results of enterprise  risk management after performing  an analysis on a system that was suppose to be hack-proof  and  was very expensive to implement?

This is an APA paper and Page limit (8) to include cover page ,reference page ,abstract.There must be at least 10 references to substantiate the Research paper

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now