1, Describe what the hacking of memory or hacking of RAM
2. Examine the common tools that hackers use to hack into
memory of computing devices. Detail two real-life examples of such tools in
3. Identify three best practices that one should use to
protect their computers from being hacked.
4. Analyze the significance of hacking in organizations and