names of close relatives and the date when they married can also be used. This can be vulnerability because individuals are given opportunities to guess accounts password and use them(Bishop

2003:68).

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply