interpretation is “attack to information” and the
second is “attack somebody or something with
the help o f information” Both of them are more
dangerous showing catastrophic consequences
than any type of attack with weapons or tanks.
b. .Attack to information is penetrating into ones
PC and ffionitoring, snooping, spying, Stealing
Information and so on. The worst site 1s that Is I
easy to hack (steal) your information virtually and I
even you do not know when» how and who hacked I
and usually you cannot mind the event or object to. I
But Spying is sometimes legal, because you click I
on “I accept” in the licence agreements written in I
small prints even not reading.
c. Information threat in business purposes also
exists; it can be understood as attack to Intellectual
Do'stlaringiz bilan baham: |