Presentation on Yahoo Data Breach from 2014-2016
My Two Questions:
1. Can you explain how a Phishing attack works? What part(s) of the CIA triad does phishing affect?
2. What are some benefits to having a backdoor as an attacker. What are some possible countermeasures that can be used to prevent backdoors?
Ещё видео!