What are the methods of defense (in context to IT-Security)?
Answer Posted / taylors engineering
it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Name the port used by PING.
What is IPCONFIG command? Why it is used?
What factors would you consider before deploying a web intrusion detection system?
What is difference between baseband and broadband transmission
What is ospf protocol
Explain difference between broadcast domain and collision domain?
What are digital signatures and smart cards?
Difference between the communication and transmission.
What is next-generation firewall (ngfw)?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is malware?
What protocol is used by DNS name servers
Why should you care about the OSI Reference Model
What is the general data protection regulation (gdpr)?
What a security mean in your sense?