Tutti i documenti dal sito essays.org sono solo per assistenza di ricerca. I materiali non possono essere presentati come il vostro lavoro!
Capo /
/
/
Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges.
This paper discusses on a journal by Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated on Data networking whereby they review a key area of data networking theory. It looks at the Seven Layer Network Model which include: Application, presentation, session, transport, network, data and physical layer.
Parametri
linguaggio | | inglese |
numero di parole | | 2275 (ca. 6.5 pagine) |
qualità del contenuto | | N/A |
livello di linguaggio | | N/A |
prezzo | | gratis |
bibliografia | | 10 |
Sommario
nessuno
Anteprima della tesi: Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges.
Shervin E, B.Victor Lawrence, Manu Malek, and Binay Suglated (1990) Network Management: Emerging Trends and challenges. In their Journal, Shervin et al discuss Data networking as a critical area of focus in the study of information security. They focus on reviewing a key area of data networking theory - The Open Systems Interconnect (OSI) Seven Layer Network Model. They demonstrate the application of the model’s concepts into the context of information security. This approach in overall, presents the perspective that common information security problems map directly to the logical patterns presented in the OSI Seven Layer Network Model, and they seek to demonstrate the Seven Layer Model’s usefulness in evaluating information ...
... incoming and outgoing data, and assume that communications could and will be subjected to attack, requiring the use of strong authentication and encryption to validate and protect data as it goes across the network. Applications should also implement their
Own security controls, that allows for careful control of privilege to access resources
And data, using a mechanism that is straightforward and bringing a balance
Between usability and effectiveness. Detailed logging and audit capability should be a
Standard feature of any application that handles sensitive or valuable data.
All the levels therefore partner up in the processing to ensure security of the information in the system.
Tesi presente nelle categorie
/
Ingegneria
/
Tecnologie Informatiche
/
Commenti
visualizza il commento in tutte le lingue
nessuno