At the end of chapter 8, three case studies and examples are presented about actual exploited risks. Choose one of the case studies and describe the risk that was exploited. Also,

At the end of chapter 8,  three case studies and examples are presented about actual exploited risks.  Choose one of the case studies and describe the risk that was exploited.  Also,  tell how you think that exploit could be avoided using proper technology and security policies.