- Arts & Culture 5937
- Business & Economics 689
- Computers 310
- Dictionaries & Encyclopedias 81
- Education & Science 74677
- Abstracts 251
- Astrology 4
- Astronomy 1
- Biology 8
- Chemistry 2221
- Coursework 15546
- Culture 9
- Diplomas 411
- Drawings 574
- Ecology 5
- Economy 83
- English 75
- Ethics, Aesthetics 3
- For Education Students 17224
- Foreign Languages 11
- Geography 2
- Geology 1
- History 89
- Maps & Atlases 5
- Mathematics 13855
- Musical Literature 2
- Pedagogics 19
- Philosophy 23
- Physics 14834
- Political Science 5
- Practical Work 101
- Psychology 60
- Religion 4
- Russian and culture of speech 8
- School Textbooks 7
- Sexology 42
- Sociology 9
- Summaries, Cribs 87
- Test Answers 150
- Tests 8455
- Textbooks for Colleges and Universities 32
- Theses 24
- To Help Graduate Students 14
- To Help the Entrant 37
- Vetting 363
- Works 13
- Информатика 10
- Engineering 3058
- Fiction 696
- House, Family & Entertainment 107
- Law 132
- Website Promotion 71
Structure and functions of the security system
Uploaded: 06.11.2023
Content: 90919215144093.38___________________________________________________________.zip 154,93 kB
Seller will give you a gift certificate in the amount of
Product description
Content
Introduction ..................................................... ........................................................ ........................... 3
1 Comparative analysis and characteristics of protection methods
information ..................................................... ........................................................ .................... 7
1.1 Virus protection .................................................................... ........................................................ .7
1.2 Protecting information on the Internet .................................................... ......................... eleven
1.3 Protection against unauthorized access .................................................... .......... 12
2 Solutions at the software level .................................................... .................................. 16
2.1 SSL – Secure Socket Layer – secure sockets protocol .............................................. 16
2.2 IPSec - protocol for protecting network traffic at the IP level ............................. …...22
2.3 FireWall ................................................... ........................................................ ................31
2.4 Check Point FireWall Stateful Inspection Technology ................................................... ........................................................ .33
2.5 Disadvantages of firewalls ..................................................... ........................... 39
3 Solutions at the hardware level .................................................... ......................... ……….43
Conclusion ................................................. ........................................................ ....................47
Glossary .................................................... ........................................................ .......................51
Bibliography .................................................... ...........................................53
List of abbreviations .................................................... ........................................................ .......55
Applications ..................................................... ........................................................ ....................56
Additional information
SGA diploma. The diploma comes with handouts and a report
Structure and functions of the security system in KKS
Feedback
0Period | |||
1 month | 3 months | 12 months | |
0 | 0 | 0 | |
0 | 0 | 0 |