A Study on Information Security Evaluation Testing Laboratory Planning - Illustration of PKI

Download Now Date Added: Jul 2006
Format: PDF

The security of information system impacts national security and social order. Just like a chain, the durability of the information security depends on its weakest part. People are so familiar with the news coverage saying that Microsoft's products fell into hackers' prey. A number of viruses, such as \"Code red worm\" and \"Sql injection attack\", were designed in accordance with the weakness of Microsoft's products so as to hit the most vulnerable spots of the information security chain.