___________ attacks allow unauthorized users to access our data, applications, or environments, and are primarily an attack against confidentiality.
Answers
Answered by
1
Answer:
Interception attacks
Interception attacks allow unauthorized users to access our data, applications, or environments, and are primarily an attack against confidentiality. Modification attacks involve tampering with our asset.
Explanation:
hope it helps
plz follów me for faster help
Similar questions