What type of software can be used to prevent, detect (and possibly correct) malicious activities on a system?
_________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Companies can now be sued for privacy violations just as easily as they can be sued for security compromises.