Business Data Networks and Security - Chapter 3
Access Control List (ACL) - has only three rules. Advanced Encryption Standard (AES) - the dominant symmetric key encryption cipher today. Supports multiple key lengths up to 256 bits Advanced persistent threats (APTs) - adversary has multiple objectives that they continue to pursue for period of months or even years. continues to conduct surveillance on the network, learning more about its operations and finding additional weaknesses
Written for
- Institution
- Cz200
- Course
- Cz200
Document information
- Uploaded on
- January 5, 2023
- Number of pages
- 9
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Answers
Subjects
-
access control list acl has only three rules advanced encryption standard aes the dominant symmetric key encryption cipher today supports multiple key lengths up to 256 bits advanced persis