SecureIT 2014
Presentation contains the following Information: – Introduction – Attack Methods – Hacking groups – Best Security model – KSP Security model -Tool and technology in use -Challenges / Bottleneck -Gaps -Wish list – Conclusion. https://www.slideshare.net/slideshow/embed_code/key/jUOXv88iLm0jlu