menu

login

 
nome
pw
registrati
cerca

lingua    
 
… benvenuto su open academic research library project …


Tutti i documenti dal sito essays.org sono solo per assistenza di ricerca. I materiali non possono essere presentati come il vostro lavoro!

Bookmark and Share
Capo /

Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges.

This paper discusses on a journal by Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated on Data networking whereby they review a key area of data networking theory. It looks at the Seven Layer Network Model which include: Application, presentation, session, transport, network, data and physical layer.

Parametri
linguaggio inglese
numero di parole 2275 (ca. 6.5 pagine)
qualità del contenuto N/A
livello di linguaggio N/A
prezzo gratis
bibliografia 10
Sommario

nessuno

Anteprima della tesi: Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges.

Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges. In their Journal, Shervin et al discuss Data networking as a critical area of focus in the study of information security. They focus on reviewing a key area of data networking theory - The Open Systems Interconnect (OSI) Seven Layer Network Model. They demonstrate the application of the model’s concepts into the context of information security. This approach in overall, presents the perspective that common information security problems map directly to the logical patterns presented in the OSI Seven Layer Network Model, and they seek to demonstrate the Seven Layer Model’s usefulness in evaluating information ...





... incoming and outgoing data, and assume that communications could and will be subjected to attack, requiring the use of strong authentication and encryption to validate and protect data as it goes across the network. Applications should also implement their
Own security controls, that allows for careful control of privilege to access resources
And data, using a mechanism that is straightforward and bringing a balance
Between usability and effectiveness. Detailed logging and audit capability should be a
Standard feature of any application that handles sensitive or valuable data.
All the levels therefore partner up in the processing to ensure security of the information in the system.
Tesi presente nelle categorie

 / 

Ingegneria
 / 
Tecnologie Informatiche
 / 
Commenti
visualizza il commento in tutte le lingue

nessuno




vai all'iniziopremihomeguidafaqENIT
condizioni d'uso | contattaci |  © essays.org - tutti i diritti riservati