Sunteți pe pagina 1din 1

Keywords Threat Vulnerability Risk Assessment Phases Calculation Terms ( Risk appetite, Risk Residual, etc.

) Threat Agents Malware (the differences ,etc.) Trojan Virus Worms Attacks (different types of attack, etc.) DOS, DDOS,...,etc. Ethics, law, different types of laws, etc. Policy Technology Firewall IDPS Encryption CA Hashing CP BIA IRP DRP BCP VPN, RADIUS, TACACT, Kerberos, IPSec Footprinting, Fingerprinting Honeypot, Honeynet, padded-cell Sniffer Biometrics Symmetric, Asymmetric, PKI, Steganography

S-ar putea să vă placă și