4.20 Methods and means of information protection in com
Sold 0
Refunds 0
Good feedbacks 0
Bad feedbacks 0
Contents
Introduction ............ .3
1 Comparative analysis of the characteristics and methods of protection
information ... .. ............ .5
1.1 Antivirus ............ .5
1.2 Protection of information on the Internet 9
1.3 Protection against unauthorized access ......... ... 10
2 The decisions on the program level ......... ... 14
2.1 SSL - Secure Socket Layer - Secure Sockets Layer ......... ... 14
2.2 IPSec - security protocol network traffic on IP-level ......... ... 18
2.3 FireWall ......... ... 27
2.4 Check Point FireWall-1 technology stateful inspection protocol (Stateful Inspection Technology) ......... ... 30
2.5 Disadvantages firewalls ......... ... 35
3 solutions in hardware ......... ... 40
Conclusion ......... ... 44
Глоссарий………………………………………………………………………………...48
List of sources used ......... ... 51
Appendix A ......... ... 54
Appendix B ....................................................................................... 57
Appendix ....................................................................................... 58
Appendix D ....................................................................................... 59
Appendix E ....................................................................................... 60
Introduction ............ .3
1 Comparative analysis of the characteristics and methods of protection
information ... .. ............ .5
1.1 Antivirus ............ .5
1.2 Protection of information on the Internet 9
1.3 Protection against unauthorized access ......... ... 10
2 The decisions on the program level ......... ... 14
2.1 SSL - Secure Socket Layer - Secure Sockets Layer ......... ... 14
2.2 IPSec - security protocol network traffic on IP-level ......... ... 18
2.3 FireWall ......... ... 27
2.4 Check Point FireWall-1 technology stateful inspection protocol (Stateful Inspection Technology) ......... ... 30
2.5 Disadvantages firewalls ......... ... 35
3 solutions in hardware ......... ... 40
Conclusion ......... ... 44
Глоссарий………………………………………………………………………………...48
List of sources used ......... ... 51
Appendix A ......... ... 54
Appendix B ....................................................................................... 57
Appendix ....................................................................................... 58
Appendix D ....................................................................................... 59
Appendix E ....................................................................................... 60
Diploma SGA.
4.20 Methods and means of information protection in computer networks
4.20 Methods and means of information protection in computer networks