First page Back Continue Last page Summary Graphic
45. Take the Originating System
- Most data exchanged via encryption is stored in plaintext.
- Get access to the database where they store the information at either end and defeat the value of the cryptosystem in assuring confidentiality and integrity of the underlying data.
Notes: