Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the methods of defense (in context to IT-Security)?

Answer Posted / taylors engineering

it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is RIS?

977


What a security mean in your sense?

1138


What is a ddos attack?

886


What is a Password?

953


What type of network do you use at home?

969


How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

904


Difference between bit rate and baud rate.

1040


What do you do when you get blue screen in a computer? How do you troubleshoot it?

989


Explain for a small lan which class of addressing is used?

920


Explain difference between broadcast domain and collision domain?

1030


Describe a TCP connection sequence

4408


What is next-generation firewall (ngfw)?

1051


What is IPCONFIG command? Why it is used?

1148


Why should you care about the OSI Reference Model

970


How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

2299