BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/5547170587475968/lesson/e7c607fb869b41c1c930050f78ec0dc6?ref=outlook-calendar
SUMMARY:Hacking-Framework
DTSTART;TZID=America/Los_Angeles:20260501T190000
DTEND;TZID=America/Los_Angeles:20260501T200000
LOCATION:https://www.learndesk.us/class/5547170587475968/lesson/e7c607fb869b41c1c930050f78ec0dc6?ref=outlook-calendar
DESCRIPTION: 
Hacking-framework. Terms

IO
Information Operations
Input/Output
In programming, rogue code is another term for code that constitutes a virus.
Deterrence (noun) the maintenance of military power for the purpose of discouraging attack
Targeting is the process by which targets are selected. Although the process is more traditionally associated with military activity it has its foundations in international humanitarian law. Conventional weapons are weapons that are not weapons of mass destruction. They can include weapons such as armored fighting vehicles, armed helicopters, combat aircraft, artillery, and warships. They can also include (but are not limited to) small arms, ammunition, cluster munitions, and land mines.

Malicious adjective  intended to cause damage to a computer system, or to steal private information from a computer system
Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are...

https://www.learndesk.us/class/5547170587475968/lesson/e7c607fb869b41c1c930050f78ec0dc6?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR