The process of confirming that someone or something is who or what it claims to be is known as ______.
_______ is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
1 Crore+ students have signed up on EduRev. Have you? Download the App |
___________ is a security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features.
A self-replicating software on a computer called a ___________ has code that specifically copies itself into other executable codes or programs.
Software with malicious content, such as viruses, worms and trojan horses, is referred to as _______.
______ are frequently intended to cause harm and are frequently sent to a PC as an email attachment.
You ought to install __________ on your computer to protect it from viruses.
296 videos|297 docs|179 tests
|
296 videos|297 docs|179 tests
|