nes a process for managing security violations.It focuses primarily on threats from outside of the organization.It defines acceptable and unacceptable use of network resources.It provides step-by-step procedures to harden routers and other network devices.46 What is a major characteristic of a worm?malicious software that copies itself into other executable programstricks users into running the in