Describe the processes involved in, and the aim of carrying out, a range of cyber security threats
Describe how web pages are located, retrieved and displayed on a device when a user enters a URL
Describe the processes involved in, and the aim of carrying out, a range of cyber security threats
Describe how web pages are located, retrieved and displayed on a device when a user enters a URL