bars
nec-license
search
circle-xmark
⌘
Ctrl
k
Computer
chevron-down
Civil
chevron-down
Mech
chevron-down
Electrical
chevron-down
Archi
chevron-down
Loksewa GK IQ
More
ellipsis
chevron-down
copy
Copy
chevron-down
Top Organizations
chevron-right
NRB
chevron-right
NRB - 6th
chevron-right
Paper III (IT Security)
chevron-right
6. Hacking Techniques, Tools, and Incident Handling
6.3 Data Governance and Information Protection
Previous
6.2 Data Leakage and Data Protection
chevron-left
Next
7. Information Security and IS Risk Management
chevron-right
sun-bright
desktop
moon
sun-bright
desktop
moon