6.5 Security Methods | Computer 12 Notes | Notely