Structure and functions of the security system
📂 Diplomas
👤 Abend
Product Description
Content
Introduction ..................................................... ........................................................ ........................... 3
1 Comparative analysis and characteristics of protection methods
information ..................................................... ........................................................ .................... 7
1.1 Virus protection .................................................................... ........................................................ .7
1.2 Protecting information on the Internet .................................................... ......................... eleven
1.3 Protection against unauthorized access .................................................... .......... 12
2 Solutions at the software level .................................................... .................................. 16
2.1 SSL – Secure Socket Layer – secure sockets protocol .............................................. 16
2.2 IPSec - protocol for protecting network traffic at the IP level ............................. …...22
2.3 FireWall ................................................... ........................................................ ................31
2.4 Check Point FireWall Stateful Inspection Technology ................................................... ........................................................ .33
2.5 Disadvantages of firewalls ..................................................... ........................... 39
3 Solutions at the hardware level .................................................... ......................... ……….43
Conclusion ................................................. ........................................................ ....................47
Glossary .................................................... ........................................................ .......................51
Bibliography .................................................... ...........................................53
List of abbreviations .................................................... ........................................................ .......55
Applications ..................................................... ........................................................ ....................56
Introduction ..................................................... ........................................................ ........................... 3
1 Comparative analysis and characteristics of protection methods
information ..................................................... ........................................................ .................... 7
1.1 Virus protection .................................................................... ........................................................ .7
1.2 Protecting information on the Internet .................................................... ......................... eleven
1.3 Protection against unauthorized access .................................................... .......... 12
2 Solutions at the software level .................................................... .................................. 16
2.1 SSL – Secure Socket Layer – secure sockets protocol .............................................. 16
2.2 IPSec - protocol for protecting network traffic at the IP level ............................. …...22
2.3 FireWall ................................................... ........................................................ ................31
2.4 Check Point FireWall Stateful Inspection Technology ................................................... ........................................................ .33
2.5 Disadvantages of firewalls ..................................................... ........................... 39
3 Solutions at the hardware level .................................................... ......................... ……….43
Conclusion ................................................. ........................................................ ....................47
Glossary .................................................... ........................................................ .......................51
Bibliography .................................................... ...........................................53
List of abbreviations .................................................... ........................................................ .......55
Applications ..................................................... ........................................................ ....................56
Additional Information
SGA diploma. The diploma comes with handouts and a report
Structure and functions of the security system in KKS
Structure and functions of the security system in KKS
No Reviews Yet
Be the first to leave a review for this product!
Related Products
Organization of preparation of complex poultry products
Seller: Товаровед 2
Organization of work of a restaurant of German cuisine
Seller: Товаровед 2
Organization of work of a fish restaurant
Seller: Товаровед 2
Preparation of products from potatoes and root vegetabl
Seller: Товаровед 2
Psychological aspects of customer service
Seller: Товаровед 2
Trade and technological process at the enterprise
Seller: Товаровед 2
Evaluation of the competitiveness of goods
Seller: Товаровед 2
Analysis of the assortment policy of a retail enterpris
Seller: Товаровед 2
More from this Seller
Mathematical analysis of unit No. 2 1357.02.03; 2 optio
For Education Students
Mathematical analysis of unit No. 3 1357.03.03;2 option
For Education Students
Mathematical analysis of unit No. 4 1357.04.03;2 option
For Education Students
Algebra and geometry 1532.01 4 option
For Education Students
Algebra and geometry 1532.01 version 6
For Education Students
Algebra and geometry 1532.02 6th option
For Education Students