What are the methods of defense (in context to IT-Security)?
Answer Posted / taylors engineering
it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.
| Is This Answer Correct ? | 1 Yes | 0 No |
Post New Answer View All Answers
Name the port used by PING.
What is a ddos attack?
If you need to encrypt and compress data for transmission, how would you achieve it?
What are the types of Transmission media
What does cia stand for in security management?
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?
Explain what is the role of single sign on in authentication technologies?
Why should you care about the OSI Reference Model
How does dlp work?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
What is an information security management system (isms)?
What is trojan virus?
What is information security?
What is slowloris?
What are the different aspects of shadow it?