Audrey Tang

For example, usually in cybersecurity we focus on protecting confidentiality and integrity. These were not harmed immediate following Pelosi’s visit. However, the attack was on the availability. Meaning that the Ministry of National Defense, or Presidential Office was not harmed, but their websites were subject to DDoS.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech