In addition to buffer overflows, programmers could leave back doors and privileges programs on an online system after its completion or termination, allowing an attacker to access your employer’s online system.
>> Referring to page 7 of attached pdf, Figure 9.2, what process do you propose to the Computer Operation Manager to mitigate an attack on your employer’s online system?