COMMUNICATION TECHNOLOGIES
2.6 NETWORK SECURITY |
|
COMMUNICATION TECHNOLOGIES
2.6 NETWORK SECURITY |
|
Hacking is the process of gaining access to computer systems by exploiting weaknesses in the system. There are many different types of hackers, some good and some bad. There are many different types of hacking from exploiting user vulnerability to brute force/trial and error methods. Some different categories of hackers include 'White Hat', 'Grey Hat' and 'Black Hat' hackers.
|
|
SUGGESTIONS
We would love to hear from you |
SUBSCRIBE
To enjoy more benefits |