Security III

A. proxy servers

B. online banking and shopping

C. use of firewall for both software and hardware

D. hypertext transfer protocol

E. transmission control protocol

F. describe how the knowledge from ‘Security I’, ‘Security II’, and ‘Security III’ can be applied to real-life scenarios including, for example, online banking, shopping

ZAK Notes