Technological superiority underpins our national military strategy, allowing us to field the most potent military forces by making best use of our resources, both economic and human. It is essential for the United States to maintain superiority in those technologies of critical importance to our security.
Answer:
Explanation:
spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid user. eavesdropping - where unauthorised third-parties intercept the data being transmitted over the secure network.
Answer:
video downloaded from a website and played on a portable electronic device
Explanation: