1. Security Prepared & Presented by Roland Abi Najem 2. The process of attempting to gain or successfully gaining, unauthorized access to computer resources is called…