Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?
Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?
Share
Unauthorized individuals can use data mining and other techniques to guess a user’s password.