
Authors
Ing. Martin Broda, PhD.
Abstract
Overview and explanation of the main cyber threats and their impact on risk management in practice. Demonstration of interception of unencrypted communication and selection of sensitive information. Explanation of selected protocols Telnet, HTTP, SMTP, and others.
license
Creative Commons BY-SA 4.0
Language
English
Year of publication
2024
price
FREE
Learning materiatls
other sources - mind map
created with support of

This project has been funded with support from the European Commission. This publication [communication] reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein.