Resources

0 0
Read Time:1 Minute, 36 Second

Public Key Infrastructure (PKI)

A framework for managing digital certificates and encryption keys.

Tools

Computerized utilities designed to study and analyze the security of IT facilities and/or break into them on an unauthorized and potentially criminal basis.[12]

Threats

Modes of potential attacks on IT facilities.[13]

Exploits

Violations of IT facilities.[14]

Criminal activity

Violation of the law by means of breaking into and/or misusing IT facilities. Laws that attempt to prevent these crimes.[15]

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %
Previous post Intro Cyber
Next post Root servers