Which of the following are tools used by hackers and Internet criminals to disrupt individual computers and entire company systems?
A) encryption and authentication
B) worms and viruses
C) sniffers and webinars
D) firewalls and decoders
E) passwords and private exchanges
B
Business