Evaluate two different methods hackers presently use to vandalize Web servers.

Evaluate two different methods hackers presently use to vandalize Web servers. Determine which of these two methods would be more difficult for security personnel to defend against. From a risk management perspective, determine the method to which you, as a security manager, would allocate more resources. Justify your answer.