What are the methods of defense (in context to IT-Security)?
Answer Posted / taylors engineering
it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
What is http flood?
What is kerberos protocol?
Explain what are digital signatures and smart cards?
who is a hacker?
Name the port used by PING.
What is the difference between routable and non- routable protocols
What is the role of single sign on in authentication technologies?
What is malware?
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
What are the types fo ddos attacks?
What is intrusion prevention systems (ips)?
What protocol is used by DNS name servers
What is BSOD?
What is a DNS resource record
What is mesh network