× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
g
3
3
2
J
2
p
2
m
2
h
2
s
2
r
2
d
2
l
2
a
2
New Topic  
bugface bugface
wrote...
Posts: 551
Rep: 7 0
5 years ago
A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
A) target
B) vulnerability
C) threat
D) key escrow
E) cipher
Read 63 times
1 Reply
Replies
Answer verified by a subject expert
w09ew09e
wrote...
Top Poster
Posts: 574
Rep: 2 0
5 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

bugface Author
wrote...

5 years ago
This site is awesome
wrote...

Yesterday
Brilliant
wrote...

2 hours ago
Thanks
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1118 People Browsing
 137 Signed Up Today
Related Images
  
 2013
  
 286
  
 506
Your Opinion
Which 'study break' activity do you find most distracting?
Votes: 741

Previous poll results: Do you believe in global warming?