4.20 Methods and means of information protection in com
Reviews 0
Secure deal
Instant delivery
Product description
Contents
Introduction ............ .3
1 Comparative analysis of the characteristics and methods of protection
information ... .. ............ .5
1.1 Antivirus ............ .5
1.2 Protection of information on the Internet 9
1.3 Protection against unauthorized access ......... ... 10
2 The decisions on the program level ......... ... 14
2.1 SSL - Secure Socket Layer - Secure Sockets Layer ......... ... 14
2.2 IPSec - security protocol network traffic on IP-level ......... ... 18
2.3 FireWall ......... ... 27
2.4 Check Point FireWall-1 technology stateful inspection protocol (Stateful Inspection Technology) ......... ... 30
2.5 Disadvantages firewalls ......... ... 35
3 solutions in hardware ......... ... 40
Conclusion ......... ... 44
Глоссарий………………………………………………………………………………...48
List of sources used ......... ... 51
Appendix A ......... ... 54
Appendix B ....................................................................................... 57
Appendix ....................................................................................... 58
Appendix D ....................................................................................... 59
Appendix E ....................................................................................... 60
Introduction ............ .3
1 Comparative analysis of the characteristics and methods of protection
information ... .. ............ .5
1.1 Antivirus ............ .5
1.2 Protection of information on the Internet 9
1.3 Protection against unauthorized access ......... ... 10
2 The decisions on the program level ......... ... 14
2.1 SSL - Secure Socket Layer - Secure Sockets Layer ......... ... 14
2.2 IPSec - security protocol network traffic on IP-level ......... ... 18
2.3 FireWall ......... ... 27
2.4 Check Point FireWall-1 technology stateful inspection protocol (Stateful Inspection Technology) ......... ... 30
2.5 Disadvantages firewalls ......... ... 35
3 solutions in hardware ......... ... 40
Conclusion ......... ... 44
Глоссарий………………………………………………………………………………...48
List of sources used ......... ... 51
Appendix A ......... ... 54
Appendix B ....................................................................................... 57
Appendix ....................................................................................... 58
Appendix D ....................................................................................... 59
Appendix E ....................................................................................... 60
Main features
- Content type File
- Content description 103,66 kB
- Added to the site 06.11.2023
Additional description
Diploma SGA.
4.20 Methods and means of information protection in computer networks
4.20 Methods and means of information protection in computer networks
Reviews
No reviews yet
Secure deal
Instant delivery