The art of covertly or secretly collecting information through the use of human sources in known as ……. Posted on:
…. has constituted a great security threat to several nations attracting incidence of drought Posted on:
Which of the following information security technology is used for avoiding browser-based hacking Posted on:
….. technology is used for analyzing and monitoring traffic in network and information flow Posted on:
….. is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction. Posted on: