Problem
1. What are the common threats explained in chapter 9 of the textbook: Technology in Action, that mostly attack the digital data and devices?
2. Which tools, software, and devices that can be used to ensure that the digital data and devices are secure?
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.