gamerpro2526 gamerpro2526 26-01-2024 Computers and Technology contestada please answer these 4 answers: What is information security? Define the various roles of a security administrator. What are three of the five categories authentication can be broken down into? What is the name of the people who attempts to hack into a computer system before it goes live to test the system.