Answer:
Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.
Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.
Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system
Explanation:
principles is what governs a place
guidelines is what you read to guide you
standards is what build up in your self
Answer:
A- ASYMMETRIC KEYS
Explanation:
Assymmetric keys are public keys that are use for encryption. They are public keys which may be disseminated or share widely, they are usually know by everyone. The keys come in pairs in which what one key encrypts, only the other can decrypt.
Asymmetric keys allows someone to send their public key in an open and insecure channel.