Answer:
The matrix theory is used by hill cipher.
Explanation:
Th technique which uses matrix theory is hill cipher technique.
Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.
For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.
Answer:
Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.
“3. To get attention from others (brag)”
The answer to setting up a home network using wireless connections is creating a (C) WAN