tanszek:oktatas:computer_system_security
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
tanszek:oktatas:computer_system_security [2025/02/12 07:49] – [Handouts] ohornyak | tanszek:oktatas:computer_system_security [2025/03/19 13:51] (current) – [Handouts] ohornyak | ||
---|---|---|---|
Line 4: | Line 4: | ||
* Data loss and corruption | * Data loss and corruption | ||
* User authentication methods, Passwords, encryption. | * User authentication methods, Passwords, encryption. | ||
- | * Protection of privacy, destruction of data | + | * Protection of privacy |
* Network security knowledge: protocols, devices, network attacks | * Network security knowledge: protocols, devices, network attacks | ||
- | | + | * Ethical hacking |
- | | + | |
* Design and implement secure applications | * Design and implement secure applications | ||
Line 128: | Line 127: | ||
- {{tanszek: | - {{tanszek: | ||
- {{tanszek: | - {{tanszek: | ||
- | - [[https:// | + | |
+ | | ||
- [[https:// | - [[https:// | ||
- {{tanszek: | - {{tanszek: |
tanszek/oktatas/computer_system_security.1739346576.txt.gz · Last modified: 2025/02/12 07:49 by ohornyak