1.4 Network Security
Example Key Words
Malware
DDoS
Brute-force attacks
Data interception
Theft
SQAuthentication
FBV: Rule of law
CC: Physical Health, Mental Health (understanding basics of essential technology)
UNRC:Article 16 (right to privacy)
External Links
- https://www.phishtank.com/what_is_phishing.php
- https://www.owasp.org/index.php/SQL_Injection
- http://www.legislation.gov.uk/ukpga/2016/25/contents/enacted/data.htm
- https://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/
- https://technet.microsoft.com/en-us/library/dd277404.aspx
- http://www.darkreading.com/careers-and-people/so-you-want-to-be-a-penetration-tester/d/d-id/1326163
- https://howsecureismypassword.net/