Skip to main content

Reviewing Traditional Security Methods

This online newspaper article, which was published in 2013, explains network security methods being proposed in the wake of a significant cyber attack. (CSC: Inventory of Authorized and Unauthorized Software)

Language
Korean
ILR Level
2+/3
ACTFL Proficiency
Superior
Material Type
Language Learning Object
Modality
Reading
Topic
Defense/Security
Learning Objectives
Maintenance & Improvement
Publication Year
2014
LLO Logo