Videos
Published on October 2nd, 2013 📆 | 8068 Views ⚑
0Illicit Data Interception and Access – Information Security Lesson #5 of 12
Text to Speech Demo
Dr. Soper discusses illicit data interception and illicit data access in the context of information security. Topics covered include man-in-the-middle attacks, keystroke loggers, physical attacks, social engineering, insider threats, computer forensics, and the principle of least privilege.
2013-10-02 17:45:55
source
Gloss