List and describe the eight basic security techniques.

What will be an ideal response?


There are various security techniques/technologies being used, such as:
? Hashing ? Data integrity
? Encryption ? Privacy
? Digital Signatures ? Message authentication
? Digital Certificates ? Sender authentication
? Firewalls ? Site integrity
? Intrusion Detection Systems ? Site integrity
? Deep Packet Inspection & Content Scanning ? Site integrity
? Virtual Private Networks (VPNs) ? Data privacy as well as site integrity

Computer Science & Information Technology

You might also like to view...

A computer consists of various devices referred to as ________ (e.g., the keyboard, screen, mouse, hard disks, memory, DVD drives and processing units).

a. objects b. software c. hardware d. groupware

Computer Science & Information Technology

What are each of the following:

1. MIDI 2. MP3 3. Analog 4. Amplitude 5. Sampling rate

Computer Science & Information Technology

InputStream and OutputStream are subclasses of the ____ class.

A. IO B. Object C. Stream D. IOStream

Computer Science & Information Technology

As a security tester, you can make a network impenetrable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology