What are the methods of defense (in context to IT-Security)?
Answers were Sorted based on User's Feedback
Answer / taylors engineering
it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.
| Is This Answer Correct ? | 0 Yes | 0 No |
What are manageable and non manageable switches?
How does arp works?
who is a hacker?
1- what is PHP ? 2- what is TS getway and TS application ? 3- what is channel in telecom and y we use ? 4- what is difference between spyware and mallware ? 5- what is main difference between standard and extended ACL ? please repley in sequence
What is the difference between cybersecurity and information security?
What are the benefits of the firewall?
what is the difference between firewall and antivirus?
2 Answers IL&FS Infrastructure Leasing Financial Services, Sitel,
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
How do we test for stateful packet in firewall ? Do we need scripts written for this ?
What is an arp and how does it work?
How the Router will pass messages or packets?How it communicate with the Switches?
What is a ddos attack?