Question: Look over the materials in this lesson(note: Medical billing/coding or Healthcare), and think about how data is collected, stored, and shared. Now, think about all the ways that a hacker might gain access to that information. Identify at least three ways (and more if you can) a hacker might gain access to information. Enter them into a Word document, save the file with the name "ComputerSecurity".