ICT (Year 8)

Cybersecurity

Which of the following can be used to protect a computer from malware?