Intro
Objectives
- Understand how a firewall works.
- Explain symmetric and asymmetric encryption and key exchange.
- Explain how digital signatures and certificates are obtained and used.
- Discuss worms, Trojans and viruses and the vulnerabilities that they exploit.
- Discuss how improved code quality, monitoring and protection can be used against such threats.