Turtle Trojans Botnet Trojan Banking Trojans Ransomware Trojans admin See author's posts Post navigation Which of the following security policies defines the use of VPN for gaining access to an internal corporate network? Ricardo wants to send secret messages to a competitor company. To secure these messages, he uses a technique of hiding a secret message within an ordinary message. The technique provides ‘security through obscurity’. What technique is Ricardo using?