In the lecture, I talk about three different supply chain co…

In the lecture, I talk about three different supply chain compromise examples. Target was one of those companies which was compromised through its supply chain because it allowed its heating, ventallation, and airconditioning contractor remote access to its systems. Because of this, the threat actors were able to steal millions of customer credit and debit card information during the 2013 holiday shopping season. What was the attack vector for the threat actor to successfully compromise Target? 

We talked about Hybrid Cryptography, why it is important, an…

We talked about Hybrid Cryptography, why it is important, and how it works when we use our browsing device to communicate with a web server like Amazon.com. Put in correct order of how Hybrid Cryptography operates when Nathan is using his Internet Browser (Google Chrome, Microsoft Edge, Safari, etc.) to connect securely to Amazon.com.