Content: 90919215144093.38___________________________________________________________.zip (154.93 KB)
Uploaded: 19.09.2009

Positive responses: 0
Negative responses: 0

Sold: 0
Refunds: 0

$18.98
Content

Introduction ..................................................... ........................................................ ........................... 3
1 Comparative analysis and characteristics of protection methods
information ..................................................... ........................................................ .................... 7
1.1 Virus protection .................................................................... ........................................................ .7
1.2 Protecting information on the Internet .................................................... ......................... eleven
1.3 Protection against unauthorized access .................................................... .......... 12
2 Solutions at the software level .................................................... .................................. 16
2.1 SSL – Secure Socket Layer – secure sockets protocol .............................................. 16
2.2 IPSec - protocol for protecting network traffic at the IP level ............................. …...22
2.3 FireWall ................................................... ........................................................ ................31
2.4 Check Point FireWall Stateful Inspection Technology ................................................... ........................................................ .33
2.5 Disadvantages of firewalls ..................................................... ........................... 39
3 Solutions at the hardware level .................................................... ......................... ……….43
Conclusion ................................................. ........................................................ ....................47
Glossary .................................................... ........................................................ .......................51
Bibliography .................................................... ...........................................53
List of abbreviations .................................................... ........................................................ .......55
Applications ..................................................... ........................................................ ....................56
SGA diploma. The diploma comes with handouts and a report
Structure and functions of the security system in KKS
No feedback yet

Similar items