|
|||||||||
![]() |
|||||||||
|
|||||||||
|
|||||||||
The seminar provided a brief overview of the current cybersecurity landscape, symptoms and causes of the problem. It also discussed the concept of ethical computing and the ethical-based remedy to protect data privacy and mitigate the risks of data breaches and computer hacking.
|
|||||||||
|