Sunday, 19 April 2020

Discuss why the following must be protected in this context

Discuss why the following must be protected in this context (what are the risks):
· Network
· Servers
· Clients
· Other resources
· Information/data
What are ways in which each of the above items can be protected in this context?

No comments:

Post a Comment

Note: only a member of this blog may post a comment.