Content: 90919214245420.20_________________________________________________________.zip (103.66 KB)
Uploaded: 19.09.2009

Positive responses: 0
Negative responses: 0

Sold: 0
Refunds: 0

$18.98
Contents


Introduction ............ .3

1 Comparative analysis of the characteristics and methods of protection

information ... .. ............ .5

1.1 Antivirus ............ .5

1.2 Protection of information on the Internet 9

1.3 Protection against unauthorized access ......... ... 10

2 The decisions on the program level ......... ... 14

2.1 SSL - Secure Socket Layer - Secure Sockets Layer ......... ... 14

2.2 IPSec - security protocol network traffic on IP-level ......... ... 18

2.3 FireWall ......... ... 27

2.4 Check Point FireWall-1 technology stateful inspection protocol (Stateful Inspection Technology) ......... ... 30

2.5 Disadvantages firewalls ......... ... 35

3 solutions in hardware ......... ... 40

Conclusion ......... ... 44

Глоссарий………………………………………………………………………………...48

List of sources used ......... ... 51

Appendix A ......... ... 54

Appendix B ....................................................................................... 57

Appendix ....................................................................................... 58

Appendix D ....................................................................................... 59

Appendix E ....................................................................................... 60

Diploma SGA.

4.20 Methods and means of information protection in computer networks
No feedback yet