List and describe the eight basic security techniques.
What will be an ideal response?
There are various security techniques/technologies being used, such as:
? Hashing ? Data integrity
? Encryption ? Privacy
? Digital Signatures ? Message authentication
? Digital Certificates ? Sender authentication
? Firewalls ? Site integrity
? Intrusion Detection Systems ? Site integrity
? Deep Packet Inspection & Content Scanning ? Site integrity
? Virtual Private Networks (VPNs) ? Data privacy as well as site integrity
You might also like to view...
A computer consists of various devices referred to as ________ (e.g., the keyboard, screen, mouse, hard disks, memory, DVD drives and processing units).
a. objects b. software c. hardware d. groupware
What are each of the following:
1. MIDI 2. MP3 3. Analog 4. Amplitude 5. Sampling rate
InputStream and OutputStream are subclasses of the ____ class.
A. IO B. Object C. Stream D. IOStream
As a security tester, you can make a network impenetrable.
Answer the following statement true (T) or false (F)