... Search Here ...

Store 100%
Sales
0
Refunds
0
Seller Offline
0 0
16.5 $
Visa MasterCard Mir WebMoney Card Steam Skin Alipay Unionpay Turkish Bank Card PAYMER check (WM Card) Gift Card Bitcoin Litecoin Digiseller USDT (Tether TRC20) Ethereum PIX Faster Payments System
Loyalty discount! If the amount of your purchases from the seller Abend is more than:
😶 No Discount
Content

Introduction ..................................................... ........................................................ ........................... 3
1 Comparative analysis and characteristics of protection methods
information ..................................................... ........................................................ .................... 7
1.1 Virus protection .................................................................... ........................................................ .7
1.2 Protecting information on the Internet .................................................... ......................... eleven
1.3 Protection against unauthorized access .................................................... .......... 12
2 Solutions at the software level .................................................... .................................. 16
2.1 SSL – Secure Socket Layer – secure sockets protocol .............................................. 16
2.2 IPSec - protocol for protecting network traffic at the IP level ............................. …...22
2.3 FireWall ................................................... ........................................................ ................31
2.4 Check Point FireWall Stateful Inspection Technology ................................................... ........................................................ .33
2.5 Disadvantages of firewalls ..................................................... ........................... 39
3 Solutions at the hardware level .................................................... ......................... ……….43
Conclusion ................................................. ........................................................ ....................47
Glossary .................................................... ........................................................ .......................51
Bibliography .................................................... ...........................................53
List of abbreviations .................................................... ........................................................ .......55
Applications ..................................................... ........................................................ ....................56
SGA diploma. The diploma comes with handouts and a report
Structure and functions of the security system in KKS