Answer:
Option A, B, and D.
Explanation:
In the above question, the some details of the question are missing that is the part of the question.
Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.
So, the following are the option that is true about the scenario.
Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.
Answer: word processing
hope this helps :)
Answer:
- to spy on one another
- to carry out cyber attacks
- to improve their public images
Explanation:
Different countries have tools to hack, control and filter information in foreign countries using different devices and techniques that allow them to be aware of any threat that may arise from another country, as well as obtaining information that helps them.
By linking technology with foreign policy, it is possible to strengthen and complement national capacities in these areas, opening the possibility of diversifying and expanding the projection of a country with an excellent image that offers sophisticated technology-based services.