tanszek:oktatas:computer_system_security
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| tanszek:oktatas:computer_system_security [2025/02/12 07:49] – [Handouts] ohornyak | tanszek:oktatas:computer_system_security [2025/03/19 13:51] (current) – [Handouts] ohornyak | ||
|---|---|---|---|
| Line 4: | Line 4: | ||
| * Data loss and corruption | * Data loss and corruption | ||
| * User authentication methods, Passwords, encryption. | * User authentication methods, Passwords, encryption. | ||
| - | * Protection of privacy, destruction of data | + | * Protection of privacy |
| * Network security knowledge: protocols, devices, network attacks | * Network security knowledge: protocols, devices, network attacks | ||
| - | | + | * Ethical hacking |
| - | | + | |
| * Design and implement secure applications | * Design and implement secure applications | ||
| Line 128: | Line 127: | ||
| - {{tanszek: | - {{tanszek: | ||
| - {{tanszek: | - {{tanszek: | ||
| - | - [[https:// | + | |
| + | | ||
| - [[https:// | - [[https:// | ||
| - {{tanszek: | - {{tanszek: | ||
tanszek/oktatas/computer_system_security.1739346576.txt.gz · Last modified: 2025/02/12 07:49 by ohornyak
