Computer Security Tutorial
Computer Security Useful Resources
Selected Reading
- Legal Compliance
- Computer Security - Checklist
- Computer Security - Policies
- Computer Security - Network
- Disaster Recovery
- Computer Security - Data Backup
- Computer Security - Encryption
- Computer Security - Malwares
- Computer Security - Antiviruses
- Computer Security - Securing OS
- Computer Security - Layers
- Computer Security - Terminologies
- Computer Security - Elements
- Computer Security - Overview
- Computer Security - Home
Computer Security Useful Resources
Selected Reading
- Who is Who
- Computer Glossary
- HR Interview Questions
- Effective Resume Writing
- Questions and Answers
- UPSC IAS Exams Notes
Computer Security - Layers
Computer Security - Layers
在计算机安全方面,一层是众所周知的从军事技术中汲取的做法。 这样做的目的是,当攻击者通过找到一个洞而成功地渗透到第一层安全时,他就必须在第二层找到一个漏洞,这样,直到他成功到达目的地为止。
下面是一部对“电离层安全”的解释。
让我们看到在安全层面的最佳做法——
Computer and Network Authentication 该网络获得的数据最好只提供给核定用户。 使用用户名和密码!
Remote Access Authentication——网络上接入的系统最好只提供给核定用户。 使用用户名和密码!
Network Folder Encodeion——与网络认证一样,如果您拥有网络储存或共享网络夹,则最好加以加密,以防止任何听从网络的未经许可用户阅读信息。