Home Page
cover of Introduction to Security - Class 3 - Part 2: Getting Access to Computers
Introduction to Security - Class 3 - Part 2: Getting Access to Computers

Introduction to Security - Class 3 - Part 2: Getting Access to Computers

00:00-33:27

How can you get into a computer? Types of security weaknesses: configuration weaknesses, social engineering vulnerabilities, software vulnerabilities, protocol weaknesses, policy weaknesses, policy vulnerabilities, hardware vulnerabilities, and denial of service.

Recordingcybersecurityeducation

Attribution NonCommercial 4.0

Others are free to share (to copy, distribute, and transmit) and to remix the audio as long as they credit the author and do not use the audio for commercial purposes.

Learn more
0
Plays
0
Downloads
0
Shares

Audio hosting, extended storage and much more

Listen Next

Other Creators