Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the methods of defense (in context to IT-Security)?

Answer Posted / taylors engineering

it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain the difference between broadcast domain and collision domain?

1050


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

963


What are the types of LAN cables used? What is a cross cable?

980


What is terminal emulation, in which layer it comes

1036


What is secure remote access?

1079


What is the difference between a switch and a hub?

1042


Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?

970


What is adware?

1008


What factors would you consider before deploying a web intrusion detection system?

953


What is BSOD?

1006


What is information security?

1155


What is a DNS resource record

1041


What is cybersecurity?

1014


How does arp works?

1099


What is meant by port blocking within lan?

1012