Your colleague tells you about a vulnerability in one of the internal applications of Infosys due to which one can access the personal information of Infoscions. What will you do?
a. Exploit the security loophole to try and find out the confidential information about other Infoscions
b. Post the details on an online forum to get help on how to best exploit the vulnerability.
c. Post it on Infosys internal communication platform/s to warn fellow Infoscions from using the application
d. Report it to ISG via AHD (Advanced Helpdesk)/global helpdesk/email to iCERT@infosys.com