Videos

Published on October 2nd, 2013 📆 | 8068 Views ⚑

0

Illicit Data Interception and Access – Information Security Lesson #5 of 12


Text to Speech Demo


Dr. Soper discusses illicit data interception and illicit data access in the context of information security. Topics covered include man-in-the-middle attacks, keystroke loggers, physical attacks, social engineering, insider threats, computer forensics, and the principle of least privilege.


2013-10-02 17:45:55

source





Tagged with:



Comments are closed.