This report refers to the Network Security Checklist and to the policies you have created and researched that define the levels and ways of communication and data transmission between the nation teams.
List the different threats to authentication and credentials.
Explain how social engineering can be a threat to credentials as well as the defenses against social engineering. How can social engineering be used to access email?
Explain the concept and use of public-key infrastructure and digital signatures and how it is used to protect access to networks, ensure non repudiation of transmissions, and preserve the confidentiality of information sharing.
Describe “leapfrogging” across networks and what it means for the multiple networks. What is escalation in the cyber attack phase?