4 Summary

This module takes a quick look at what can happen when a system get compromised, and how a system gets to become compromised. In the next modules, we’ll take a look at essential background knowledge that is needed to help protect a system from being compromised.