DIGITAL TECHNOLOGIES
.
Home
Exercises
Chapter 5.
SAFE COMPUTER
5.1 Examples of attacks: ransomware
5.2 Examples of attacks: macro viruses and phishing
5.3 05-03 Attackers' goals and methods
5.4 Computer technical security
5.5 Data backup and archiving
5.6 Systematic approach to security