Ginni has Published 1580 Articles

What is Packet Filtering in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:51:40

959 Views

Packet filtering is controlling access to a network by inspecting the incoming and outgoing packets and letting them move or halting them depends on the IP address of the source and destination. Packet filtering is one technique for implementing security firewalls.Packet filtering is both a tool and a method that ... Read More

What are the types of Proxy Server?

Ginni

Ginni

Updated on 07-Mar-2022 07:48:59

732 Views

There are various types of Proxy Server which are as follows −Forward Proxy Server − A forward proxy is a type of proxy server that generally passes requests from users in an internal network to the internet through a firewall.Forward proxies are configured to allow or deny the user's request ... Read More

What is a Proxy Server in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:46:53

253 Views

A proxy server is an intermediary server that fetch data from an Internet source, including a webpage, on behalf of a user. They act as more data security boundaries securing users from malicious events on the internet.Proxy servers have some uses, and it is based on their configuration and type. ... Read More

What is DMZ in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:44:23

716 Views

DMZ stand for the Demilitarized Zone. It defines a host or network that acts as a secure and intermediate network or path among an organization's internal network and the external, or non-propriety, network. It is called a network perimeter or perimeter network.DMZ is generally implemented to secure an inside network ... Read More

What are the ways that unscrupulous people use to access or abuse unprotected computers?

Ginni

Ginni

Updated on 07-Mar-2022 07:41:38

124 Views

There are many creative ways that unscrupulous people use to access or abuse unprotected computers which are as follows −Remote login − When someone is able to connect to the computer and control it in some form. This can range from being able to view or access the document to ... Read More

What is Firewalls in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:40:02

1K+ Views

A firewall can be represented as a specific type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a represented group of security rules. It facilitates as a barrier between inside private networks and outside sources (such as the public ... Read More

What is Kerberos in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:38:00

3K+ Views

Kerberos is a network authentication protocol designed to support powerful authentication for client/server applications using secret-key cryptography. Kerberos provides the largest level of security to network resources.Kerberos was produced by MIT as a solution to these network security issues. The Kerberos protocol uses powerful cryptography so that a user can ... Read More

What are the keys used by PGP in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:35:20

3K+ Views

PGP creates use of four types of keys including one-time session symmetric keys, Public keys, Private keys, and Passphrase based symmetric keys.Session key generation − Each session key is related to a single message and is used only for the goals of encryption and decrypting that message. Remind that message ... Read More

What are the services of PGP?

Ginni

Ginni

Updated on 07-Mar-2022 07:33:15

16K+ Views

PGP includes the following services which are as follows −Authentication − The hash function used is SHA-1 which makes a 160 bit message digest. EP (DP) defines public encryption (decryption) and the algorithm used can be RSA or DSS.The set of SHA-1 and RSA supports an effective digital signature scheme. ... Read More

What is PGP in information security?

Ginni

Ginni

Updated on 07-Mar-2022 07:31:30

3K+ Views

PGP stands for Pretty Good Privacy. It is an encryption program that uses cryptographic privacy and authentication to online communications. PGP is most generally used for maintaining contents of emails encrypted and private. PGP is accessible as a plugin for some e-mail clients, including Claris Emailer, Microsoft Outlook/Outlook Express, and ... Read More

Advertisements