Friday, September 13, 2019
HW Assignment Example | Topics and Well Written Essays - 250 words - 3
HW - Assignment Example Customer identification programs are also usually protected as a way of maintaining ethics on the net. Companies are also keen to release any of the important information regarded as business security and such information are normally protected with passwords and cookies which prevent hackers from obtaining them (Mason pg 7). 3. Due to rapid development in technology companies are forced to change swiftly with the changes. Virtual Private Network is useful in extending private network across to the public which helps in sharing of data across public and private networks. Through proxy servers most companies have adopted the use of Wide Area Network as a means of faster communication. 4. Intrusion Detection Systems have failed in the sense that they fail to raise alarms in case of a hacking procedure begins. IDS cannot work better since they only depend on either signature matching or abnormality to detect an attack. However, this is not normally done faster due to the single lines that the system uses and therefore might take a longer time before detection of any attack. Hackers have monitored the use of obfuscation, fragmentation, encryption, and overloading as a means of exploiting IDS. 5. IPsec is not used everywhere since it needs to be invisible to the users. Most of the time if IPsec is under use it is usually invisible to the writer of the web browser as well as the web server. This is usually done by the web administrator. Moreover it requires a lot of set up to function well since it performs better at system level and not the application
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.