Write a two paragraph on the following below:
Why are information systems vulnerable to destruction, error, and abuse? Describe how you would prevent hacking of a system. What do you consider the prime motivation for hacking a system? Research how firms have dealt with their systems being hacked.