ICT (Year 6)

Cybersecurity

What system is commonly used to protect computers from unauthorized access?