A computer program that functions normally while quietly installing malicious software on a machine is known as a:
The practice of following an authorized person through an entrance without using a badge to defeat security is called:
Which of the following encryption standards is found on older wireless devices and provides minimal security?