The 2012 report created by the _____________________ summarized security concerns associated with ICT, and established five different categories for ICT security issues.

Fill in the blank(s) with the appropriate word(s).

U.S. Government Accountability Office (GAO)

Computer Science & Information Technology

You might also like to view...

The .rtf file format is used to preserve structure and most text formatting when transferring documents between applications or platforms

Indicate whether the statement is true or false

Computer Science & Information Technology

The header field that indicates whether the packet is a fragment is ____.

A. flags B. options C. protocol D. destination IP address

Computer Science & Information Technology