Start Discovering Solved Questions and Your Course Assignments
TextBooks Included
Active Tutors
Asked Questions
Answered Questions
what is the file-system securitymost commercial servers use a powerful operating system as base that provides good methods of file-system security
determine about the security methodssecurity methods also protect information from accidental or intentional modification manipulation or destruction
multiple layers of intranet securitysecurity requirements vary from organisation to organisation they also vary on the content that the organisations
state the implementation of a security policy the implementation of a security policy should invariably cover all parameters of security such as
state the term availability - organisational security scheme what data needs to be available continually compared to data which can be off line for
explain the term - integrity in most cases corporate data should remain unchanged by third parties so the system should be capable of ensuring that
explain the term confidentiality - firewall design policywhilst some corporate data is for public consumption the vast majority of it should remain
define the firewall design policy a lower-level policy that describes how the firewall will handle prevention of access and filtering of services as
what is the network service access policy a high-level issue-specific policy which defines those services that are allowed or denied from the
what are the aspects of security policy the security policy should cover aspects such as network service access physical access limits of acceptable
enumerate in brief about the intranet security policyan intranet security policy is a very broad topic and it cannot be covered easily in few pages
state the scope of security policy the scope of security policy depends on aspects such as the size of the intranet site type of information hosted
determine about the security policyin the united states the government has a separate organisation looking after the security measures and providing
what are the disadvantages of a vpn implementationthe greatest disadvantage of a vpn implementation is its non-flexibility to accept unknown
virtual private networks vpnin order to encryptdecrypt all the communication network traffic that passes through the internet or intranet a vpn uses
define the full form of ssl ssl has become fundamental to the spread of internet community and commerce and trade over internet over years the spread
communications between the user and the server a significant enhancement was achieved when communications between the user and the server was sent in
web server security through ssl secure socket layeras it is well known that the intranets and internet are purely based on use of powerful web
what are the digital certificates of hardware computationsdigital certificates are highly dependent on hardware computations it is essential that
detail explanation of cryptographic modulesphysical security of the cryptographic modules is also built in order to provide total security of the
enumerate about the specialised hardware specialised hardware such as protected memory or cryptographic memory module for storing and protecting the
determine the primary memory of the serverthe keys used for accessing the server are held at a secret location in the primary memory of the server
public key infrastructure solutions the use of public-key based security systems requires great attention and due care in design and management of
illustrate the encryption and decryption methodsone of the best method of ensuring security is to change the form of communication let the messages
determine about the microprocessora microprocessor contains at the least cpu which was the case in 1970s and early 1980s today they include cache