NDE

My repositories and a little bit about my path to become a pentester

Download as .zip Download as .tar.gz View on GitHub

Identification, Authentication, and Authorization

Unauthorized access to sensitive data is one of the most serious risk that organizations face. More than ever, strong identification, authentication and authorization are requiered to deal with this risk.

Image