A breached operating system profile demonstrates this clearly. Once an attacker gains access to the OS, everything on the ...