tanszek:oktatas:computer_system_security
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tanszek:oktatas:computer_system_security [2024/02/27 06:54] – [Handouts] superuser | tanszek:oktatas:computer_system_security [2025/03/19 13:51] (current) – [Handouts] ohornyak | ||
---|---|---|---|
Line 4: | Line 4: | ||
* Data loss and corruption | * Data loss and corruption | ||
* User authentication methods, Passwords, encryption. | * User authentication methods, Passwords, encryption. | ||
- | * Protection of privacy, destruction of data | + | * Protection of privacy |
* Network security knowledge: protocols, devices, network attacks | * Network security knowledge: protocols, devices, network attacks | ||
- | | + | * Ethical hacking |
- | | + | |
* Design and implement secure applications | * Design and implement secure applications | ||
Line 125: | Line 124: | ||
===== Handouts ===== | ===== Handouts ===== | ||
- | - {{tanszek: | + | |
- | - {{tanszek: | + | |
- | - [[https:// | + | - {{tanszek: |
- | - [[https:// | + | - {{ : |
- | - {{tanszek: | + | - [[https:// |
- | - {{tanszek: | + | - [[https:// |
- | - {{tanszek: | + | - {{tanszek: |
+ | - {{tanszek: | ||
+ | - {{tanszek: | ||
===== Test Questions ===== | ===== Test Questions ===== |
tanszek/oktatas/computer_system_security.1709016875.txt.gz · Last modified: 2024/02/27 06:54 by superuser