Computer Science (Year 9)

Cyber Security

Which of the following types of software is used to protect computers from malicious attacks?