Authentication: Multiple credentials/smart cards/biometrics are more sophisticated versions of this., Protects a network by requiring a username and password to log on., Firewall: Configurable to allow or deny certain addresses of types of data in/out of a network., Come in two forms, hardware and software., Can perform stateful packet inspection on the contents of packets as they pass through., Proxy: Physical computer placed between an internal network and the outside world., All traffic must physically pass through this on its way into or out of a network., Encryption: Makes traffic unintelligible, Comes in two forms, symmetric and asymmetric., An algorithm and key is used with this method.,

Classifica

Stile di visualizzazione

Opzioni

Cambia modello

Ripristinare il titolo salvato automaticamente: ?