Define Key Terms

Define the following key terms from this chapter, and check your answers in the glossary:

asset

BYOD

brute-force (password-guessing) attacks

CERT

RDDoS

risk

threat

Traffic Light Protocol (TLP)

vulnerability

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset