How do hackers attack a secure system?
How do defenders protect a computer system against attack?
Objectives:
Review computer security techniques
Physical
Systems
Encryption
Understand how all of these techniques work together to create a multi-layered security environment
Consider how these layers may fail or be bypassed
Save the world!
Consider how these layers may fail or be bypassed
Save the world!