Resources

Public Key Infrastructure (PKI)

A framework for managing digital certificates and encryption keys.

Tools

Computerized utilities designed to study and analyze the security of IT facilities and/or break into them on an unauthorized and potentially criminal basis.[12]

Threats

Modes of potential attacks on IT facilities.[13]

Exploits

Violations of IT facilities.[14]

Criminal activity

Violation of the law by means of breaking into and/or misusing IT facilities. Laws that attempt to prevent these crimes.[15]