Which of the following approaches to cyber security takes a bottom - up approach to assessing
vulnerabilities meticulously item by item?
Question No 2
Data Processing includes which of the following steps?
Question No 3
Francis bought a car 4 years ago and is unsure if the company has any data on her. What can Francis
do?
Question No 4
In order to keep data secure, which three things should be considered?
Question No 5
A person who enters into another person's computer via illegal means for personal gain, for example
to steal data which will benefit them personally, is known as what?