To compete in today’s fast-paced competitive environment, organizations are increasingly a
And worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information. A.damageable
B.susceptible
C.vulnerable
D.changeable