Computer Science, asked by pateldivyam56, 10 months ago

Q2. Complete the following chart.
Examples of
unauthorized
access​

Answers

Answered by varadhabala29
1

Answer:

Unauthorised access may be in the form of malicious attacks such as virus, trojan horses etc. Sometimes the authorised attack may be using the phishing techniques or spoofing.

Similar questions