
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Of Viruses, Botnets, and Logic Bombs
1 июн. 2020 г. · 32 мин. Prime Video
Доступно на Prime Video
Сезон 1, серия 4: Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers like puppets). Then, investigate some common defense mechanisms that help pinpoint and capture these threats.
1 июн. 2020 г. · 32 мин.