_____________ is the technique used in business organizations and firms to protect IT assets.
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach .
a) Ethical hacking
b) Unethical hacking
c) Fixing bugs
d) Internal data-breach .