A Study on Information Security Evaluation Testing Laboratory Planning - Illustration of PKI

The security of information system impacts national security and social order. Just like a chain, the durability of the information security depends on its weakest part. People are so familiar with the news coverage saying that Microsoft's products fell into hackers' prey. A number of viruses, such as \"Code red worm\" and \"Sql injection attack\", were designed in accordance with the weakness of Microsoft's products so as to hit the most vulnerable spots of the information security chain.

Provided by: National Chiao Tung University Topic: Security Date Added: Jul 2006 Format: PDF

Find By Topic