Reviewing Traditional Security Methods
This online newspaper article, which was published in 2013, explains network security methods being proposed in the wake of a significant cyber attack. (CSC: Inventory of Authorized and Unauthorized Software)
Language
Korean
ILR Level
2+/3
ACTFL Proficiency
Superior
Material Type
Language Learning Object
Modality
Reading
Topic
Defense/Security
Learning Objectives
Maintenance & Improvement
Publication Year
2014