Write short note on server-side attack and insider attack.
Server-side attack: Server-side attacks are like sneaky intrusions where an outsider (the attacker) tries to mess with a server directly. The goal is to break … Read more
Server-side attack: Server-side attacks are like sneaky intrusions where an outsider (the attacker) tries to mess with a server directly. The goal is to break … Read more
Various attacks in computer security: Malware: Macro Viruses: File Infectors: System or Boot-Record Infectors: Stealth Viruses: Trojans: Logic Bombs: Worms: Droppers: Ransomware: Denial of Service … Read more
Following are the components of security policy:
Security mechanisms used to provide security in computer system are: Encipherment: Data Integrity: Digital Signature: Authentication Exchange: Traffic Padding: Routing Control: Notarization:
Advantages: Disadvantages:
Bell -LaPadula Model (BLP): a. Purpose: b. Description: c. Key Point: Biba Model: a. Purpose: b. Description: c. Key Point: Brewer and Nash Model (Chinese … Read more
General Policies: Server Policies: Firewall Access and Configuration Policies: Backup Policies: VPN Policies:
Advantages of Computer Security: Disadvantages of Computer Security:
Five steps to protect computer system hardware are:
To protect the system, security measures can be taken has at following levels: Physical Security: Human Security: Operating System Security: Networking Security: