Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are the methods of defense (in context to IT-Security)?

Answer Posted / taylors engineering

it may still be influenced by the operating system
community in order to adjust the context to their needs.
The other driving force of changes will be the use of
cryptographic methods, which will contribute to some new
security functions, but also help to extend traditional
security functions across single system boundaries.
Looking at security functions as a whole it will turn out
that even the more classical ones are not yet mature but
stil need improvements in order to reach generality,
symmetry, and applicability.

Is This Answer Correct ?    1 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Name the port used by PING.

1015


What is a ddos attack?

937


If you need to encrypt and compress data for transmission, how would you achieve it?

1112


What are the types of Transmission media

1100


What does cia stand for in security management?

1079


What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

981


Explain what is the role of single sign on in authentication technologies?

1061


Why should you care about the OSI Reference Model

1027


How does dlp work?

1116


Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?

985


What is an information security management system (isms)?

1125


What is trojan virus?

1003


What is information security?

1186


What is slowloris?

947


What are the different aspects of shadow it?

1054