Securing the components-information security, Computer Network Security

SECURING THE COMPONENTS

Computer can be subject of an attack or the object of an attack. When subject of an attack, computer is used as lively tool to conduct attack. The figure shows how hacker exploits the information with respect to the subject (client) and object server

                      2226_SECURING THE COMPONENTS-Information security.png

 

                                                 Figure--Computers as Subject and Object of an Attack

 

 

Posted Date: 10/8/2012 4:42:15 AM | Location : United States







Related Discussions:- Securing the components-information security, Assignment Help, Ask Question on Securing the components-information security, Get Answer, Expert's Help, Securing the components-information security Discussions

Write discussion on Securing the components-information security
Your posts are moderated
Related Questions
Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

Question: (a) Explain and illustrate with a drawing the three-layer feedforward multilayer perceptron neural network. (b) Summarize the standard backpropagation algorithm in

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any


Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Question (a) Draw a typical hybrid star-ring topology paying attention to how the clients and switching hubs are connected. (b) State 3 main differences between a router

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

Attacks on Cryptosystems Attacks are attempts to achieve unauthorized access to secure communications have characteristically used brute force attacks. Attacker may alternatively

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD