• Chapter VII. MECHANISMS TO COMBAT COMPUTER VIRUSES AND MALWARE
  • Chapter VIII. LOCATION FIREWALLS IN PROTECTION OF INFORMATION
  • Chapter IX. OPERATING SYSTEM SECURITY
  • Chapter X. CHANNELS OF INFORMATION LEAKAGE
  • Chapter VI. IDENTIFICATION AND




    Download 7,8 Mb.
    Pdf ko'rish
    bet248/249
    Sana20.05.2024
    Hajmi7,8 Mb.
    #246687
    1   ...   241   242   243   244   245   246   247   248   249
    Chapter VI. IDENTIFICATION AND
    AUTHENTICATION
    6.1. Concept of identification and authentication...................
    131
    6.2. Password-based authentication......................................... 137
    6.3. Certificate-based authentication......................................
    142
    6.4. Strict authentication........................................................
    145
    6.5. Biometric identification and authentication of users....... 
    164
    Chapter VII. MECHANISMS TO COMBAT '
    COMPUTER VIRUSES AND MALWARE
    7.1. Computer viruses and virus protection issues.................
    171
    7.2. Antivirus software............................................................
    180
    7.3. Local system antivirus protection.................................... 
    187
    Chapter VIII. LOCATION FIREWALLS IN
    PROTECTION OF INFORMATION
    8.1. Firewall features................................................................ 
    192
    8.2. The main components of Firewall.................................... 
    202
    8.3. Protection scheme network on based Firewalls................ 213
    367


    Chapter IX. OPERATING SYSTEM SECURITY
    9.1. Security problems of operating system ........................... ....226
    9.2. Architecture security subsystem of operating system ... 
    228
    9.3. Applying software application in protection of in­
    formation.......................................................................................231
    Chapter X. CHANNELS OF INFORMATION
    LEAKAGE
    10.1. Technical channels of information leakage and their 
    classification............................................................................. 
    238
    10.2. Methods and tools to determine technical channels of 
    information leakage................................................................
    242
    10.3. Engineering protection and technical defending of ob­
    jects 
     
    250

    Download 7,8 Mb.
    1   ...   241   242   243   244   245   246   247   248   249




    Download 7,8 Mb.
    Pdf ko'rish