Identify the practice in which a hacker locks out users and encrypts their personal computer files and

Posted Date: