An _______ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.
A Online Intrusion takes place when an unauthorized person gains access to a digital device by using an internet connection and exploiting vulnerabilities in hardware or software