What are the methods of defense (in context to IT-Security)?

Answer Posted / taylors engineering

it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is a Password?

613


What is mesh network

618


What is the difference between ripv1 & ripv2?

539


What is site-to-site vpn?

551


What are the types of Transmission media

620






How does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

531


Explain what are digital signatures and smart cards?

598


What is utm firewall?

590


What are manageable and non manageable switches?

566


Why do we use virtual private network?

566


Explain what is the role of single sign on in authentication technologies?

601


Explain for a small lan which class of addressing is used?

552


Define the meaning of an Authentication.

610


How does the HTTP handle state?

597


What are digital signatures and smart cards?

569