During the forensic a phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive. The attacker used those keys to intercept and decrypt sensitive traffic on a web server. Which of the following describes this type of exploit and the potential remediation?
Jeend
2 years, 3 months agolupinart
4 years, 11 months agos3curity1
4 years, 11 months ago