INFO6003 (2013) Data Exfiltration -- Papers

LoadingLoading previews...
Advanced-data-exfiltration-–-the-way-Q-would-have-done-it.pdf
Text
Download (194kB)
    Advanced-data-exfiltration-–-the-way-Q-would-have-done-it.pdf
    Advanced-data-exfiltration-–-the-way-Q-would-have-done-it.pdf
    Tracy_HICSS42.pdf
    Tracy_HICSS42.pdf
    2 files in this resource

    INFO6003 (2013) Data Exfiltration -- Papers

    This is a fun paper about data exfiltration. It's suggested reading, I'd like you to try and grasp how difficult the problem is why looking at one 'creative" attack. The second paper is a technical approach, only for the people seriously interested in this topic.

    Actions (login required)

    View Item View Item

    Toolbox

    There are no actions available for this resource.