Which of the following terms describes an attacker trying to steal personal or sensitive information using a VoIP system?
Attacks, Threats, and Vulnerabilities | |
Architecture and Design | |
Implementation | |
Operations and Incident Response | |
Governance, Risk, and Compliance |