List and describe the eight basic security techniques.
What will be an ideal response?
There are various security techniques/technologies being used, such as:
? Hashing ? Data integrity
? Encryption ? Privacy
? Digital Signatures ? Message authentication
? Digital Certificates ? Sender authentication
? Firewalls ? Site integrity
? Intrusion Detection Systems ? Site integrity
? Deep Packet Inspection & Content Scanning ? Site integrity
? Virtual Private Networks (VPNs) ? Data privacy as well as site integrity
Computer Science & Information Technology
You might also like to view...
Another term for viewing or summarizing data in a PivotTable is known as ________ the information around to get varying views of the data
Fill in the blank(s) with correct word
Computer Science & Information Technology
What are the four guidelines for good form design?
What will be an ideal response?
Computer Science & Information Technology