Chapter 1: The data aggregation system is compromised
A long time ago, the client solution made use of a DevOps system to aggregate data on transcoding processes and online broadcasts. However, it proved vulnerable to cyberattacks and was eventually hacked. Determined to enhance their security, the company intended to replace it with an advanced data monitoring and aggregation solution that would respond to their data security and resistance system requirements.