............................
Mark me brainliest^^
<span>tunneling Term used
process of encasing one protocol or packet inside another protocol or packet</span>
Answer:
Explanation:
well we don’t need it we just use it =) hope it helps
Answer:
Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.