Advertisements
Advertisements
प्रश्न
What remedies are available against these threats.
संक्षेप में उत्तर
उत्तर
- Network Layer Security: TCP/IP protocols may be secured with cryptographic methods and security protocols. These protocols include Secure Sockets Layer (SSL), succeeded by Transport Layer Security (TLS) for web traffic, Pretty Good Privacy (PGP) for email, and IPsec for the network layer security.
- Internet Protocol Security (IPsec): IPsec is designed to protect TCP/IP communication in a secure manner. It is a set of security extensions developed by the Internet Engineering Task Force (ITF). It provides security and authentication at the IP layer by transforming data using encryption. Two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and ESP. These two protocols provide data integrity, data origin authentication, and anti-replay service. These protocols can be used alone or in combination to provide the desired set of security services for the Internet Protocol (IP) layer.
The basic components of the IPsec security architecture are described in terms of the following functionalities:- Security protocols for AH and ESP
- Security association for policy management and traffic processing
- Manual and automatic key management for the Internet key exchange (IKE)
- Algorithms for authentication and encryption
- Security Token: A six-digit code which randomly changes every 30-60 seconds on a security to rise is used. The key on the token has built in mathematical computations and manipulate numbers. Every thirty seconds only a certain number can be used to access the online account. The website that the user is logging into is made aware of the number. It verifies every time that the number used to log is the right one for a particular 30-60 seconds cycle.
shaalaa.com
E-security
क्या इस प्रश्न या उत्तर में कोई त्रुटि है?
APPEARS IN
संबंधित प्रश्न
A firm manufactures defense equipment. In order to ensure that only authorized personnel enter the secured area they install a high-tech retina scanner:
What does the above portray?
Which will not harm computer resources?
Why is E-security must?
E-security means ______.
All of the following are E-security threats except ______.
Due to which of the following reason, people do not shop online?
VIRUS and hacking are threats to ______.
What is E-security?
Why E-security is needed?
Give the full form of the following:
E-security