Importance of Computer Security and Privacy:
Ensuring the protection of our important data like credit card numbers, account details, trade secrets, proprietary research info and sensitive communications were of little concern …show more content…
When this has been done, you can then examine this information and after that take a look at an attack vector to attempt and penetrate identified networks to check whether they can be concluded by using known weakness outputs, attacks and dissent of service attacks. You generally do this by envisioning you are a hacker attempting to get into the system. You could use the same instruments that the bad fellows may use and in the same manner