More cards in this set

Card 6

Front

DOS attacks atempt to do what?

Back

Preview of the front of card 6

Card 7

Front

how does encryption hide the contents of a message?

Back

Preview of the front of card 7

Card 8

Front

what are protocols?

Back

Preview of the front of card 8