Grade 12 Cat Theory Notes-Term2 - Network
Grade 12 Cat Theory Notes-Term2 - Network
Playlist/Link URL
GRADE 12
SPREADSHEET PLAYLIST YouTube Link
YouTube Link
THEORY PLAYLIST
SYSTEM TECHNOLOGIES Q/A YouTube Link
GRADE 11
SPREADSHEET PLAYLIST YouTube Link
1
© Sirantwi 2020
PAT PLAYLIST
GRADE 10
SPREADSHEET PLAYLIST YouTube Link
PAT PLAYLIST
2
© Sirantwi 2020
Network Technologies
Topic Concept / Term Explanation / Definition Advantages Disadvantages
WAN A network that spans a large 1.Allows global 1.Expensive to set up
geographical area and connects communication 2.security risks due to
multiple LANs via communication 2.Data sharing public access.
channels. 3.Access to online
➢ Communication methods services.
include cables, microwaves,
radio waves and satellites.
3
© Sirantwi 2020
4
© Sirantwi 2020
eFiling (SARS) Definition: A secure online system 1.Convenient – can be 1. Complex for users with
that allows individuals and done from home; little tax knowledge—may
businesses to submit tax returns require assistance.
and perform tax-related functions 2.saves time;
electronically 2. The Digital Divide (the
3.available 24/7;
difference between people
What can be done by efiling
File tax returns, 4.immediate who have easy access to
make payments, submission
the internet and those who
view tax status, confirmation.
receive notices from SARS, register do not) becomes more
for tax. 5. Reduces queues at
noticeable.
SARS offices;
6. improves record
keeping.
5
© Sirantwi 2020
6
© Sirantwi 2020
7
© Sirantwi 2020
8
© Sirantwi 2020
➢ Mobile access 24/7 to the Internet ➢ Limited or slow access if in area with
from anywhere in the world. poor coverage.
➢ Use smartphone or tablet to access ➢ No cables to connect to the Internet.
the Internet.
➢ Can connect to the Internet from ➢ Never escape communication (such as
anywhere where there is coverage e-mail and browsing).
9
© Sirantwi 2020
10
© Sirantwi 2020
- Free router
- No-contract options
2. Email Services - Free email address
- Spam filtering
- Webmail access
- Secure mailbox
3. Web Hosting / Domains - Free domain name with hosting
- SSL certificate
- Website builder tools
4. VoIP (Voice Calls) - Free VoIP number
- Low call rates
- VoIP router or handset included
5. Cloud Storage / Backup - Free limited cloud storage (e.g. 5GB–50GB)
- Paid upgrades
- Automatic backups
6. Streaming Services - Bundled Showmax / Netflix
- Free or discounted subscriptions
- Zero-rated data
7. Security Services - Free antivirus trial
- Parental controls
- Add-on security packages
11
© Sirantwi 2020
Afrihost Free setup, free-to-use router, month-to-month contracts, first month 50% off
Vodacom LTE SIM + router deals, family data sharing, discounted fibre
MTN Fibre + LTE deals, smart home bundles, free mobile data with some packages
12
© Sirantwi 2020
Example of a Bundle:
• 1GB Data + 100 minutes of voice calls + 100 SMS for a set price, often with a 30-day
validity.
Mobility If you need to move the connection around (mobile internet vs fixed fibre).
13
© Sirantwi 2020
Shaped vs Shaped: Certain internet services (e.g., browsing, e-mail) are given high priority, while other
Unshaped services (e.g., streaming) are limited.
Unshaped: All internet services get equal priority, and no specific service is limited.
Broadband vs Broadband: A high-speed permanent internet connection
Bandwidth (e.g., ADSL, SDSL, 3G/4G).
14
© Sirantwi 2020
Soft cap/Hard Soft Cap: A data limit where users can continue using the
cap internet after reaching the cap, but with reduced speed.
Throttled speed (ISP slowed down) after the cap is reached.
Hard Cap: A data limit where users can no longer access the
internet once the cap is reached.
No service (internet stops working) once the cap is
exceeded.
Topic Description
Data • Data Transmission Speed refers to the rate at which data is transmitted from one point to
Transmission another over a network or communication channel.
Speeds • In simpler terms, data transmission speed indicates how quickly data (such as files,
videos, or web pages) can be sent or received over a network, with higher speeds meaning
faster transfers.
• Measured in bits per second (bps) and kilobits per second (Kbps) megabits per second
(Mbps) or gigabits per second (Gbps)
Wired ADSL (Asymmetric Digital Subscriber Line):
Connections • ADSL is a type of broadband internet connection that uses telephone lines to transmit
digital data.
• A digital connection via a fixed landline that provides more bandwidth for downloading than
uploading.
• ADSL provides different speeds for downloading and uploading.
• The download speed is much higher than the upload speed.
15
© Sirantwi 2020
Wireless Wi-Fi or Mobile Data (3G/4G/5G) that do not require physical cables and provide flexibility but may
Connections be affected by interference or range limitations.
16
© Sirantwi 2020
17
© Sirantwi 2020
🔑 Key Points:
• Acts as a bridge between a wired network and wireless clients.
• Extends the range of a wired network to support wireless connectivity.
• Commonly used in homes, offices, schools, and public places as part of a
Wi-Fi network.
• Can be built into a router or set up as a standalone device.
19
© Sirantwi 2020
20
© Sirantwi 2020
21
© Sirantwi 2020
22
© Sirantwi 2020
23
© Sirantwi 2020
✅ Internet Services:
Service Explanation / Definition Advantages Disadvantages
Cloud Computing Delivery of computing resources (e.g., servers, - Reduces hardware - Requires stable internet
storage, software) over the internet. costs - Security concerns
- Accessible anywhere - Subscription costs
Cloud computing is using storage, software and other
resources from remote servers on a network through the
- Scalable based on - Data ownership issues
internet need
- Supports collaboration
Cloud Storage Remote storage of data via the internet (e.g., Google - Accessible on any - Needs internet to
Drive, Dropbox). device access
- Automatic backups - Limited free space
- Easy file sharing - Vulnerable to hacking
- Saves local storage - Privacy depends on
space provider
Grid Computing A system whereby the resources (hardware) of - Powerful processing - Complex setup and
different computers are shared and used at the same for complex tasks management
time to solve a single problem - Cost-efficient - fast Network
- Handles large-scale dependency
➢ A scientist studying scientific concepts has the
research - Compatibility issues
ability to use an entire network of computers - Shares unused - Not suitable for real-
in order to analyses data. resources time tasks
24
© Sirantwi 2020
VoIP (Voice over Protocol that allows telephone calls to be made over - Cheaper than - Poor call quality on
Internet Protocol) LANs, WANs and the Internet traditional calls slow connections
Voice and video calls over the internet (e.g., Skype, - Supports video & - Needs good hardware
Zoom). group calls - Not reliable for
- Cross-device access emergencies
- Additional features - Security risks
(chat, screen share)
Video Conferencing Real-time communication using video and audio over - Enables remote - Requires stable, high-
the internet (e.g., Zoom, Microsoft Teams, Google meetings speed internet
Meet). - Saves travel time and - Can suffer from lag or
costs dropouts
- Supports screen - Privacy/security
sharing and concerns
collaboration - May reduce face-to-
- Can record sessions face interaction quality
for future reference
25
© Sirantwi 2020
Email Sending messages via the internet with support for - Fast delivery - Spam and phishing
attachments (e.g., Gmail). - Formal & professional - Requires internet
- Permanent record - Not ideal for real-time
- Allows attachments chats
- Inbox clutter
File Sharing(file Sending digital files over the internet through various - Quick file transfer - Risk of viruses/malware
swapping) platforms. - Easy collaboration - Copyright infringement
- Reduces need for (on illegal platforms)
Eg google drive file sharing
physical media - Needs internet
- Can share large files - Security risks
FTP (File Transfer Transfers files between systems over the internet, - Efficient for large files - Requires FTP client
Protocol) commonly used in web development. - Used for managing setup
websites - Less secure unless
A protocol used for the fast and easy transfer of files
- Fast over strong encrypted (use SFTP)
between remote computers that have an Internet connections - Can be blocked by
connection. - Reliable for tech users firewalls
- Tech knowledge
Example : FileZilla -No file size restrictions.
needed
26
© Sirantwi 2020
27
© Sirantwi 2020
28
© Sirantwi 2020
29
© Sirantwi 2020
30
© Sirantwi 2020
Theft: ➢ Mobile devices are at high risk because of their size ➢ Lock computer rooms
and weight that allows them to be packed into ➢ Install CTV cameras
pockets and bags easily. ➢ Use biometric security to
➢ Laptops of executives are at risk because of the access computer rooms
software and confidential information they contain. /server rooms
Impacts of hardware theft
🔒 Personal Impact:
• Loss of personal data (photos, documents,
passwords).
• Identity theft risk from stolen personal information.
• Financial loss from replacing the stolen hardware.
• Emotional distress and reduced sense of security.
• Disruption of daily life if the device was used for
school, work, or communication.
🏢 Company Impact:
31
© Sirantwi 2020
Software ➢
➢ Software theft takes 3 forms :
Theft:
1. Someone steals software media:
Software (on CD or flash drive/external HDD) not
stored in secured locations are stolen away.
Hardware containing the software can be stolen.
2. Software Piracy
➢ Pirated software is distributed for money or malicious
reasons .
➢ Software piracy has the following negative effects on the
end-user.
o No access to technical support
o No upgrades
o Incomplete or virus contaminated products
32
© Sirantwi 2020
33
© Sirantwi 2020
Software Piracy Unauthorized copying, distribution, or use of - Use licensed - Financial loss to
Theft software without permission from the owner software only developers
or licensor. - Install anti-piracy - Legal
software consequences
- Employ digital - Reduced quality of
rights management software products
(DRM) - Damaged
- Educate users on reputation
legal consequences - Hinders innovation
- Regularly audit
software licenses
Cracking The act of bypassing a software’s protection - Implement strong - Loss of revenue for
to use it illegally or distribute unauthorized encryption companies
versions. - Use license - Risk of malware
activation codes being introduced
- Implement anti- - Unstable software
tamper technology performance
- Monitor software - Increased security
usage vulnerabilities
- Regular software - Legal ramifications
updates
Software Distributing counterfeit copies of software to - Purchase software - Financial losses for
Counterfeiting unsuspecting users. from authorized legitimate
dealers companies
34
© Sirantwi 2020
End-User License Violating the terms of the software license - Read and - Legal issues for
Agreement (EULA) agreement, such as sharing or distributing understand EULA users and
Violations software beyond the agreed terms. terms organizations
- Use software - Damaged software
within licensed vendor relationships
scope - Loss of
- Enforce functionality
organizational - Increased support
policies on software costs
use - Harm to
- Use license intellectual property
tracking tools rights
Information Data Breaches Unauthorized access or disclosure of sensitive - Encrypt sensitive - Loss of user trust
Theft or confidential information (e.g., personal data - Financial penalties
data, corporate secrets). - Implement access for organizations
control policies - Identity theft
- Regularly update - Reputation damage
security systems - Legal
- Conduct security consequences
audits
- Use multi-factor
35
© Sirantwi 2020
authentication
(MFA)
Hacking Unauthorized access to systems or networks - Secure networks - Data theft or loss
to steal data or cause harm. with firewalls - Financial losses
- Regularly patch - Reputational
and update systems damage
- Educate users on - Legal actions
secure passwords - Service disruption
- Limit access based
on roles
- Use intrusion
detection systems
Insider Threats Employees or authorized users intentionally - Monitor user - Financial damage
or unintentionally causing data theft or harm activities to company
to the organization. - Implement role- - Intellectual
based access property theft
- Conduct - Damage to
background checks employee trust
- Create clear data - Legal and
handling policies regulatory
- Use data loss consequences
prevention (DLP) - Loss of competitive
tools advantage
36
© Sirantwi 2020
Social Engineering Manipulating individuals into revealing - Educate users on - Loss of sensitive
confidential information or bypassing security social engineering data
measures (e.g., impersonation or phishing). tactics - Financial loss
- Verify suspicious - Compromised
Types of social Engineering tricks
calls/emails security
1. Phishing-attackers trick people
through e.g. e-mails, false - Use strong - User trust erosion
websites to provide personal information) verification - Increased
2. Tailgating (also known as processes vulnerability to
'piggybacking', -involves an attacker - Implement secure further attacks
seeking entry to a restricted area communication
which lacks the proper protocols
authentication)
3. Watering hole (injecting malicious
code into public webpages of a site
that the users visit)
4. Baiting (focuses on peoples'
curiosity where they are promised
something in return for providing
personal information)
5. Pretexting (attackers create a fake
identity and use it to manipulate the
receipt of information)
6. Pharming: tricking someone using a
website or a link
7. Click jacking: Tricking someone using
a concealed/hidden link to get
sensitive information
8. Smishing- using an SMS to deceive
someone into getting sensitive
infromation
37
© Sirantwi 2020
Stolen Devices Physical theft of devices (e.g., laptops, - Encrypt data on - Loss of data
phones) that contain sensitive data or access devices - Financial cost of
credentials. - Use remote wipe replacing devices
capabilities - Breach of privacy
- Lock devices with - Access to sensitive
passwords or accounts
biometrics - Potential
- Secure devices regulatory fines for
when not in use data protection
- Install anti-theft breaches
software
38
© Sirantwi 2020
39
© Sirantwi 2020
Cybersecurity Threats: Hoax, Spam, Pop-up, Adware, Malware, Virus, Scam, Spyware, Ransomware,
Keylogger, Worm, Trojan
Concept / Term Explanation / Definition Preventive Measures Negative Impact
Hoax A false or misleading message designed to deceive or - Verify information from - Misleading people
spread misinformation, often via email or social credible sources - Wasting time and
media. - Don’t share unverified resources
information - Spreading panic or fear
- Educate users on hoaxes - Loss of trust in online
- Use fact-checking information sources
websites
- Avoid sensational claims
Spam Unsolicited and often irrelevant or advertising - Use spam filters - Clutters inbox
messages sent in bulk, typically via email or - Don’t open unknown - Wastes time and
messaging platforms. emails or attachments resources
- Block spammers - Can carry malicious
- Report spam messages attachments
- Avoid sharing email - Lowers productivity
publicly - Reduces user trust in
email communication
Pop-up A type of window that appears suddenly on a screen, - Use pop-up blockers - Interrupts browsing
often used for advertising, which can be annoying or - Avoid clicking on pop- experience
malicious. ups - Can lead to unwanted
- Keep software and redirects or malware
browsers updated - Slows down system
- Educate users on performance
40
© Sirantwi 2020
Adware Software that automatically displays or downloads - Use ad-blockers - Increases unwanted ads
unwanted advertisements, often as a way of - Install trusted antivirus - Slows down system
generating revenue for the developer. programs - Privacy invasion
- Regularly update - May contain malware
software - Annoying for users
- Avoid downloading
untrusted programs
- Be cautious with free
apps
41
© Sirantwi 2020
Malware Malicious software designed to damage, disrupt, or - Install and regularly - Data loss
gain unauthorized access to computer systems. update antivirus software - Security breaches
- Don’t open suspicious - System crashes
emails or attachments - Slows down system
- Use firewalls performance
- Regularly back up data - Risk of identity theft or
- Use secure networks fraud
Virus A type of malware that attaches itself to legitimate - Install antivirus software - Corrupts or deletes files
programs and spreads to other programs or files, - Avoid downloading files - Slows down or crashes
potentially causing harm. from untrusted sources systems
- Keep software updated - Data loss
- Use email filters - Spreads rapidly between
Symptoms of a computer infected with a virus - Scan files before opening devices
➢ Hardware problems - Can steal personal
➢ Computer freezes information
➢ Slow performance
➢ Slow startup
➢ Files go missing or are hidden
➢ Disks are not accessible
➢ Unusual messages
42
© Sirantwi 2020
Scam Fraudulent schemes that deceive individuals or - Verify the legitimacy of - Financial loss
organizations into losing money or providing personal offers - Loss of personal data
information. - Never share sensitive - Damaged reputation
information online - Emotional distress
- Avoid clicking on - Legal consequences for
suspicious links victims
- Educate users about
common scams
Spyware Software that secretly monitors and collects user data - Install antivirus software - Invasion of privacy
without consent, often for advertising purposes or to - Regularly update - Loss of sensitive data
steal personal information. software - Reduced system
- Use secure web performance
browsers - Can lead to identity theft
- Be cautious with free - Unauthorized data
apps sharing
- Monitor system activity
Ransomware A type of malware that encrypts a user’s files or locks - Back up data regularly - Loss of important files
them out of their system, demanding a ransom for - Install and update - Financial loss from
(Data
access. antivirus software ransom
kidnapping)
- Avoid clicking on - Disruption of business or
suspicious links personal activities
- Use strong passwords - Can cause permanent
- Disable macros data loss
Keylogger A type of spyware that records keystrokes to capture - Use virtual keyboards for - Compromised passwords
sensitive information such as passwords or credit card entering sensitive data - Identity theft
numbers. - Install antivirus software - Financial theft
- Avoid untrusted - Unauthorized access to
43
© Sirantwi 2020
44
© Sirantwi 2020
Worm A type of malware that replicates itself and spreads - Install firewalls and - Network congestion
across networks or devices, often causing network antivirus software - Overloaded systems
congestion and system crashes. - Regularly update - Slows down or crashes
software systems
Symptoms of a computer infected with worm
- Avoid clicking on - Risk of data loss
➢ Slow computer performance
suspicious links - Can spread rapidly and
➢ Freezing
- Isolate infected systems infect multiple systems
➢ Programs opening and running automatically
immediately
➢ Irregular web browser performance
➢ Unusual computer behaviour (messages,
images, sounds, etc.)
➢ Firewall warnings
➢ Missing/modified files
➢ Operating system errors and system error
messages
➢ E-mails sent to contacts without the user's
knowledge
Trojan Malicious software disguised as legitimate software - Download software only - Data theft
or files, which, once installed, can damage or steal from trusted sources - Loss of privacy
data from the infected system. - Use antivirus software - System damage
- Regularly update - Potential to install other
45
© Sirantwi 2020
Exploit
Exploits are programs that contain data or code that
takes advantage of a vulnerability within application
software that's running on your computer.
Rootkit
Rootkits' main purpose is to prevent malicious
programs being detected.
Trojan-DDoS
These programs conduct DoS (Denial of Service)
attacks against a targeted web address. By sending
multiple requests from your computer and several
other infected computers the attack can overwhelm
the target address leading to a denial of service.
Trojan-Ransom
This type of Trojan can modify data on your
computer so that you can no longer use specific data.
The criminal will only restore your computer's
performance or unblock your data, after you have
paid them the ransom money that they demand.
46
© Sirantwi 2020
Bot A bot is an automated program that performs - Use anti-malware - Can be used to
repetitive tasks on the internet. tools launch attacks
- Regularly update - Can steal sensitive
Some bots are used for malicious purposes.
software data
- Use firewalls - Overloads servers
- Educate users on - Reduces system
suspicious behaviors performance
- Avoid downloading - Facilitates illegal
untrusted programs activities like spam
Botnet A network of infected computers (bots) that are - Install antivirus and - Can be used for
controlled remotely to carry out tasks, often anti-malware DDoS attacks
malicious, like launching attacks. programs - Facilitates large-scale
- Keep software up to spam
date - Can steal data
- Use strong passwords - Overloads websites
- Monitor unusual or services
network activity - Can result in financial
- Disconnect infected loss or service
devices disruptions
Zombie A computer that has been compromised and is - Install and update - Can be used in
under the control of a remote attacker. antivirus software botnets
- Disconnect from the - Can launch DDoS
Zombies are often part of a botnet.
network if infected attacks
- Perform regular - Steals sensitive
security scans information
How to know if a computer has been infected by
- Educate users on - Damages system or
bots/botnet/zombie
data integrity
47
© Sirantwi 2020
DDoS (Distributed Denial A DDoS attack overwhelms a target system with a - Use DDoS mitigation - Service downtime
of Service) / DOS (Denial flood of traffic, rendering it unavailable to users. services - Financial loss from
of Service) - Set up firewalls and disrupted operations
DOS is a similar attack but from a single source.
intrusion prevention - Damaged reputation
systems - Loss of customer
- Implement rate- trust
Symptoms of a DDoS
limiting on servers - Increased costs to
➢ Usually slow network performance
- Monitor network mitigate attacks
➢ Unavailability of certain websites
traffic
48
© Sirantwi 2020
49
© Sirantwi 2020
Firewall:
➢ This is a specialized soft-ware/hardware that prevents unauthorized access to an
internal computer network.
➢ A firewall is a security measure that protects or guards against unauthorized incoming
or outgoing access to a computer or a computer network from unauthorised access.
➢ A firewall can be software, hardware, or a combination of both configured to manage
and regulate data flow between networks of different trust levels by permitting or
denying data.
➢ A firewall is a program or hardware device that filters the information coming through
the internet connection into your network or computer
➢ A firewall allows or prevents traffic based on certain rules
➢ A firewall constantly monitors all incoming and outgoing traffic. If an incoming packet
of information is marked by the filters, it is not allowed through
➢ Without a firewall, the connection to the internet is open and a hacker would be able to
make a connection to a computer in a network (Wi-Fi or cabled)
➢ Hardware firewall:
• The Router acts as a hardware firewall (alone standing devices)
• The Proxy acts as a hardware firewall (networked devices)
❖ Software firewall
➢ o Specific software designed to filter traffic on a network
➢ examples of firewalls are email firewall and network firewall
Advantages of firewall
➢ A firewall blocks harmful packets of data and does not allow it to reach the location
where it can do harm
➢ You can set up the level of internet security using the built-in features of the router
➢ Provide functions that make it possible to scan incoming emails
➢ Monitors traffic
➢ Stops hackers
➢ Stops Keyloggers
➢ Blocks trojans
Disadvantages of firewall
➢ A firewall might disable particular applications from accessing the network and block
or allow URL's from loading
➢ A firewall may be difficult to maintain
➢ A software firewall may decrease speed because it will evaluate every packet of
information
50
© Sirantwi 2020
Advantages Disadvantages
Companies can keep track of who is on Anyone can create a profile without it
their website. needing to get verified.
The information on the website can be People can create more than one account
set up according to the individual's and act as different people
preferences and what they want to see.
You can use a nickname/username to Websites like torrents make it easy for
identify yourself and anyone to get ('seed')
51
© Sirantwi 2020
❖ You can create an e-mail address that you do not use for your banking and other personal
things and give that up as the address where they can contact you.
❖ You have the right to:
Keep any information about yourself and your family private.
Apply settings on applications and social media sites that protects your information.
Withhold any information from someone who you feel/think might want to use it for a
malicious act.
Upload any form of documents that you created or pictures of yourself/family and choose
who can have access to view or read it.:
Advantages Disadvantages
People are encouraged to speak their Information taken from the internet must
mind on forums, groups and sites where be cross-referenced and verified,
any topic can be discussed. especially if that information is being
used in an article/research assignment.
Not everything on the internet is
It becomes easier to ignore/'unfollow' People assume the identity of other
people who are negative. people. Anyone can take your
unprotected personal information or
information and steal your identity to
commit a crime.
It encourages innovation and new
ideas can be created from
52
© Sirantwi 2020
➢ Have a written policy (AUP) that outlines the activities for which the computer and
network may and may not be used
➢ Use firewalls – blacklists for IP addresses and URLs
➢ Never open an e-mail attachment immediately if the antivirus software flags it as
infected.
➢ Do not respond to unsolicited e-mail message.
➢ Ensure that data is encrypted during data transmission over net-works.
Protection against computer crime
Use ABC
➢ Assume nothing: don’t assume you are safe and protected.
➢ Believe no one: check up on people you are interacting with
➢ Check everything: bad spelling and grammar. Check incorrect website URLs.
These things can help you decide if an e-mail or website is legitimate or not.
53
© Sirantwi 2020
• People should never download attachments from people they don't know.
• Children should be taught about safe communication on the internet to protect them
from predators.
• Individuals should not keep passwords on their computers.
• Do not use common passwords like the names of kids, birthdays, or other guessable
words.
• Never give a password to someone else.
• Never start a computer with removable media inserted in the rives in the ports unless
the media are uninfected .
• Delete chain letters and spam
• Install antivirus and antispyware on your computer. update the antivirus regularly.
• Do not clicks on pop up messages and adverts.
• Back up your data.
• Check the reputation of online shops before making any purchases
• Manage social media settings (privacy settings)
Make sure your social networking profiles (e.g. Facebook, Twitter, YouTube, MSN, etc.)
are set to private.
Check yoursecurity settings.
Be careful what information you post online.
Once it is on the internet, it is extremely difficult to remove.
Ensure you use strong passwords and good password policies
By changing your login details, at least once or twice a month, you can cut down your
chances of being a target of cybercrime.
Secure home networks (Wi-Fi)
Be aware of what you do while using public Wi-Fi Hotspots, while these access points are
convenient, they are far from secure.
Avoid conducting financial or corporate transactions on these networks.
54
© Sirantwi 2020
55