Question

involves hacking secure computer networks at the enemy's most sensitive military bases, defense contractors, and aerospace companies in order to steal important data or to access their defenses.
a. Cyber terrorism
b. Cyber espionage
c. Cyber bullying
d. Cyber stalking

Answer

This answer is hidden. It contains 1 characters.