Structure and functions of the security system

Sold 0
Refunds 0
Good feedbacks 0
Bad feedbacks 0

Content

Introduction ..................................................... ........................................................ ........................... 3
1 Comparative analysis and characteristics of protection methods
information ..................................................... ........................................................ .................... 7
1.1 Virus protection .................................................................... ........................................................ .7
1.2 Protecting information on the Internet .................................................... ......................... eleven
1.3 Protection against unauthorized access .................................................... .......... 12
2 Solutions at the software level .................................................... .................................. 16
2.1 SSL – Secure Socket Layer – secure sockets protocol .............................................. 16
2.2 IPSec - protocol for protecting network traffic at the IP level ............................. …...22
2.3 FireWall ................................................... ........................................................ ................31
2.4 Check Point FireWall Stateful Inspection Technology ................................................... ........................................................ .33
2.5 Disadvantages of firewalls ..................................................... ........................... 39
3 Solutions at the hardware level .................................................... ......................... ……….43
Conclusion ................................................. ........................................................ ....................47
Glossary .................................................... ........................................................ .......................51
Bibliography .................................................... ...........................................53
List of abbreviations .................................................... ........................................................ .......55
Applications ..................................................... ........................................................ ....................56
SGA diploma. The diploma comes with handouts and a report
Structure and functions of the security system in KKS