No credit card required
When you are finished reading this chapter, you should understand:
The difference between a threat actor, an exploit, an attack, a vulnerability, an asset, and a risk
The concept of defense in depth, and how it relates to security
The concept of AAA and what AAA systems are designed to accomplish
The concept of data exhaust
The process used to exchange private keys
The concept of a distributed ...