List and detail at least two ways someone may be unethically using a device or a network. Explain at least two ways a person can verify a website’s security and credibility. Describe two ways to identify a suspicious link or banner advertisement. Explain at least one method your friend can use to ensure there won’t be an attack on this device. What are two ways he can prevent a security breach when he’s done with his research?