Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.
Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.
I think the First reason is; it provides the best way of business communication.
Second reason, streamline communication
Third reason cost effective resource sharing :) (hope this helps)
Answer:
good luck djfjjdndnfjfjjfjfdsadd
Answer:
a. True
Explanation:
The above listed information are part of the reasons why so many IT projects are abandoned by the business entities after a given period of time frame.
Answer:
Explanation:
well we don’t need it we just use it =) hope it helps