Thursday, June 20, 2019

HW Assignment Example | Topics and Well Written Essays - 250 words - 3

HW - Assignment ExampleCustomer identification programs are also usually protected as a way of maintaining ethics on the net. Companies are also keen to release any of the important information regarded as business warranter and such information are normally protected with passwords and cookies which prevent hackers from obtaining them (Mason pg 7).3. Due to rapid development in technology companies are forced to change fleetly with the changes. Virtual Private Network is useful in extending one-on-one network across to the public which helps in sharing of data across public and private networks. Through proxy servers most companies have adopted the use of Wide Area Network as a means of faster communication.4. Intrusion staining Systems have failed in the sense that they fail to raise alarms in case of a hacking procedure begins. IDS cannot work better since they only depend on each signature matching or abnormality to detect an attack. However, this is not normally done faste r due to the single lines that the system uses and therefore might yield a longer time before detection of any attack. Hackers have monitored the use of obfuscation, fragmentation, encryption, and overloading as a means of exploiting IDS.5. IPsec is not used everywhere since it ask to be invisible to the users. Most of the time if IPsec is under use it is usually invisible to the writer of the sack up browser as well as the web server. This is usually done by the web administrator. Moreover it requires a lot of set up to function well since it performs better at system train and not the application

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.