Computer Science (Year 8)

Cybersecurity

Which of these is a method of protecting your computer from malware?