Question 2
Question 2 of 13

Question image for Q2
Topics Tested

Hacking including the measures that must be taken in order to protect data

The need to identify the inputs, outputs and processing of the current system, problems with the current system, the user and information requirements for the new system