1. A company called XYZ Inc. has recently migrated its entire infrastructure to the cloud. However, they did not put enough emphasis on network security and have become a target for a cyber attack. The attackers were able to penetrate the company's network and access sensitive information, I including customer data and financial information. a) How did the attackers gain access to the network? 5M b) Draw an attack tree threat modelling. 10M c) What was the impact of the attack on XYZ Inc.? 5M d) How can XYZ Inc. prevent similar attacks in the future?5M (25 Marks).