Computer Science, asked by gulamoman, 4 months ago

___________ attacks allow unauthorized users to access our data, applications, or environments, and are primarily an attack against confidentiality.

Answers

Answered by BlueMoonLady
1

Answer:

Interception attacks

Interception attacks allow unauthorized users to access our data, applications, or environments, and are primarily an attack against confidentiality. Modification attacks involve tampering with our asset.

Explanation:

hope it helps

plz follów me for faster help

Similar questions