What are the methods of defense (in context to IT-Security)?

Answer Posted / taylors engineering

it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

553


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

506


Explain difference between broadcast domain and collision domain?

567


What is terminal emulation, in which layer it comes

558


What is udp flood?

582






What is intrusion prevention systems (ips)?

572


How do we use rsa for both authentication and secrecy?

524


Why is it important to have a nac solution?

736


What is the difference between a virus and malware?

527


Define the meaning of an Authentication.

604


What is network access control?

618


who is a hacker?

611


How does arp works?

555


What is ransomware?

567


What is utm firewall?

584