Authentication: Multiple credentials/smart cards/biometrics are more sophisticated versions of this., Protects a network by requiring a username and password to log on., Firewall: Configurable to allow or deny certain addresses of types of data in/out of a network., Come in two forms, hardware and software., Can perform stateful packet inspection on the contents of packets as they pass through., Proxy: Physical computer placed between an internal network and the outside world., All traffic must physically pass through this on its way into or out of a network., Encryption: Makes traffic unintelligible, Comes in two forms, symmetric and asymmetric., An algorithm and key is used with this method.,

05. Activity 2 Network security

Výsledková tabule/Žebříček

Vizuální styl

Možnosti

Přepnout šablonu

Obnovit automatické uložení: ?