#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Infecting a victim system with a computer trojan, backdoor or other malware application of this type that ensures the attacker’s presence in the target environment;
Answer
Installation