What are the methods of defense (in context to IT-Security)?
Answer Posted / taylors engineering
it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.
Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
Explain difference between broadcast domain and collision domain?
What is terminal emulation, in which layer it comes
What is udp flood?
What is intrusion prevention systems (ips)?
How do we use rsa for both authentication and secrecy?
Why is it important to have a nac solution?
What is the difference between a virus and malware?
Define the meaning of an Authentication.
What is network access control?
who is a hacker?
How does arp works?
What is ransomware?
What is utm firewall?