Presentation contains the following Information:
– Introduction
– Attack Methods
– Hacking groups
– Best Security model
– KSP Security model
-Tool and technology in use
-Challenges / Bottleneck
-Gaps
-Wish list
– Conclusion.
https://www.slideshare.net/slideshow/embed_code/key/jUOXv88iLm0jlu