First page Back Continue Last page Summary Graphic
45. Take the Originating System
Most data exchanged via encryption is stored in plaintext.
Get access to the database where they store the information at either end and defeat the value of the cryptosystem in assuring confidentiality and integrity of the underlying data.
Notes: