Wednesday 29 June 2011

Re: || VU Expert 2009 || CS507_FALL 2011 IDEA SOLUTION

binish plzzzzzzzzzzzzzzzzzzzzzzzzzz yaaaaaaaaar STA301 ka solution send kr do
 
 
 
 
 
 
 
 
 
 
 
 
 
> *Intrusion Detection Systems (IDS)***
>
> Another element to securing networks is an intrusion detection system (IDS).
> IDS is used in
>
> complement to firewalls. An IDS works in conjunction with routers and
> firewalls by monitoring
>
> network usage anomalies. It protects a company's information systems
> resources from external aswell as internal misuse.
>
>
>
> • Signature-based: These IDS systems protect against detected intrusion
> patterns. The
>
> intrusive patterns they can identify are stored in the form of signatures.
>
> • Statistical-based: These systems need a comprehensive definition of the
> known and
>
> expected behaviour of systems.
>
> • Neural networks: An IDS with this feature monitors the general patterns of
> activity and
>
> traffic on the network and creates a database.
>
>
>
> *Web Server Logs***
>
> System and network logs can alert the Web administrator that a suspicious
>
> event has occurred and requires further investigation. Web server software
> can provide additional
>
> log data relevant to Web-specific events. If the Web administrator does not
> take advantage of these capabilities, Web-relevant log data may not be
> visible or may require a significant effort to access.
>
>
>
> *Also explain the technique used to make your electronic documents (such as
> email, text files) secured? [10 marks]*
>
> *.*
>
>
>
> *Biometrics***
>
> Identification of an individual through unique physical characteristics is
> proving to be quite safe
>
> and secure for allowing access. The study of personal characteristics has
> been extensively used
>
> for identification purposes. Biometrics can be defined as study of automated
> methods for
>
> uniquely recognizing humans based upon one or more intrinsic physical or
> behavioral traits.
>
> * *
>
> *Passwords***
>
> "Password is the secret character string that is required to log onto a
> computer system, thus
>
> preventing unauthorized persons from obtaining access to the computer.
> Computer users may
>
> password-protect their files in some systems."
>
>
>
> *Cryptography***
>
> In literal terms, cryptography means science of coded writing. It is a
> security safeguard to render
>
> information unintelligible if unauthorized individuals intercept the
> transmission. When the
>
> information is to be used, it can be decoded. "The conversion of data into a
> secret code for the
>
> secure transmission over a public network is called cryptography.
>
>
> --
>
> * **●●Gяєу_Fєяяy ●●
> **[image: Bloom Box Wiki]*
>
> --
> Please visit http://www.weblyceum.com and get registered for Past Papers,
> Quiz, Assignments, GDBs and much more...
>
> To post to this group, send email to vu-experts@googlegroups.com
>
> Do write to bilal.zaheem@gmail.com for Help, suggestion and Complaint.
>

--
Please visit http://www.weblyceum.com and get registered for Past Papers, Quiz, Assignments, GDBs and much more...

To post to this group, send email to vu-experts@googlegroups.com

Do write to bilal.zaheem@gmail.com for Help, suggestion and Complaint.

--
Please visit http://www.weblyceum.com and get registered for Past Papers, Quiz, Assignments, GDBs and much more...
 
To post to this group, send email to vu-experts@googlegroups.com
 
Do write to bilal.zaheem@gmail.com for Help, suggestion and Complaint.

No comments:

Post a Comment