Answer:
Vulnerability
Explanation:
Vulnerability: In information security, Vulnerability is defined as a weakness or flaw in the system which leaves it wide open to attackers to gain sensitive/confidential information and cause severe damage to the organization.
What can happen?
If this weakness doesn’t get treated, then the SQL injection attack is most likely to happen which will result in sensitive database being stolen by the hackers. This can cause serious implications for any organization hence it very important to take such vulnerabilities very seriously and dealt accordingly.
b. instruments for trained transcription workers
c. printing press
d. faster delivery service
Answer:
Computer Security Protocol
Explanation:
A series of procedures that ensures a computer and its user are safe is a computer security protocol. A computer security protocol is a sequence of operations that is designed to ensure the protection of data. This is an important requirement for all computer users. Such a protocol ensures a secure delivery of data between two parties.