There are three (3) main goals of data security. List them and discuss how they provide protection.
Describe and discuss the three (3) threats associated with data security.
Illustrate out the three (3) authentication methods employed to grant access to secured data.
There are different kinds of viruses which affect a program. List all the two (2) common viruses and illustrate out how they affect programs.
List all the two (2) antivirus techniques employed for protection purposes.