↳
j'ai récité bêtement ce que je savais comme a l'école
↳
to stay on top of latest news i explained that regularly check security news articles likc thehacker news and bleeping computer. I mentioned i was ok to work shift work. I mentioned that i was not knowledgeable in mobile threats, but i did say that i have actively been learning offensive security to improve my skills regularly. Less
↳
I would do my best to remain professional and request a sit-down meeting with the manager (and include an additional person for clarity and witness verification purposes). Starting out, I would inform them that the directive or order issued causes me to feel uncomfortable with the decision or action needed to meet the desired result. As well, it would be in direct violation of one or more of the core values that BP has in place and lives by. In particular this core value (Safety, or example). I would then discuss with my manager any alternatives that could be made and recommend that all safety measures must be met as expected or all operations must cease until all is clarified or rectified. If none can be identified or if the original directive is demanded of me, and yet no resolution has been achieved, then it would be my responsibility to either speak to my next highest manager to reduce any unwanted outcomes. Less
↳
After the secure connection is made, the session key is used to encrypt all transmitted data. Browser connects to a web server (website) secured with SSL (https). ... Server sends a copy of its SSL Certificate, including the server's public key. Less
↳
Check Point Cisco Core Security Dell FireEye Fortinet Gigamon GuidePoint Security HP IBM Juniper Networks ManageEngine McAfee NitroSecurity (acquired by McAfee) Palo Alto Networks Radware Snort (Sourcefire/Cisco) Solutionary (acquired by NTT) Sourcefire (acquired by Cisco) Splunk Trend Micro Less