This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 1.
A Visualization of Standard security attacks
Figure 2.
An illustration of Program Threats (On the left with the layout for a typical stack frame, Hypothetical stack frame for (a) before then (b) after, on the right A boot-sector computer virus)
Figure 3.
The Morris Internet worm an illustration
Figure 4.
Cryptography Security Tool in action (on the left A secure communication over an insecure medium, in the middle Encryption and decryption using RSA asymmetric cryptography, on the right A man-in-the-middle attack on asymmetric cryptography)