What are the methods of defense (in context to IT-Security)?
Answers were Sorted based on User's Feedback
Answer / taylors engineering
it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
Context are used to overcome Failover with the help of
Context one can configure Failover and types of failover
are Active-Active,Active-Standby and a single Firewall can
be configured in such a manner which will act as multiple
firewalls by configuring Contexts .Contexts are configured
in order to overcome Failover for defense purpose.
| Is This Answer Correct ? | 0 Yes | 0 No |
I want to reset the passwords of 100 users.how do you do it?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is the difference between arp & rarp?
What is stateful inspection firewall?
What is the idea behind the Bell-La Padula model?
How to implement PIX firewall security?
What are the different type of networking / internetworking devices
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
Explain what are all the technical steps involved when the data transmission from server via router?
My System Loaded Cyber Crome ,Whom i can't Access proper Internet , so plz give me some idea .whom i will can access proper internet .my e mail id amit.amitsharma21@gmail.com
What are the 5 aspects of IT-Security?
What is kerberos protocol?