Computer Science, asked by deshmukhsonali1976, 1 month ago

Name the Following in a word-
The program that can waren. you regarding threat you regarding the potential​

Answers

Answered by TrishnaMandal
0

Answer:

order to protect yourself you need to know about the different ways in which your computer can be compromised and your privacy infringed. In this section, we discuss a few common tools and techniques employed by the cyber criminals. This isn’t an exhaustive list by any means, but will give you a comprehensive idea of the loopholes in networks and security systems, which can be exploited by attackers, and also their possible motives for doing so.

Similar questions
Math, 1 month ago