Various Security Method

    Access Control

Access control to computers is primarily by password protection: a user provides a valid username and corresponding password. Often there are a number of further passwords required to gain access to the network or other computers, but if these are provided correctly, the user is assumed to be valid.

password     MultiMedia Demo

    Encription

Ensuring the privacy of messages, encryption can be offered in two different forms, private key and public key. Private- or symmetric-key encryption is based on a key (or algorithm) being shared between two parties. The same key both encrypts and decrypts messages. Kerberos and the Data Encryption Standard (DES) are traditional private-key technologies. A private-key mechanism is a proven, relatively simple method of encryption. The main problem is in sharing the key: How can a key that is used for security be transmitted over an unsecured network? The difficulties involved with generating, storing and transmitting keys (called key management) can limit private-key systems, especially over the Internet

encryption     MultiMedia Demo

    Virus

Viruses are the colds and flus of computer security: ubiquitous, at times impossible to avoid despite the best efforts and often very costly to an organization's productivity.
We can using a two-tiered approach for detecting and preventing viruses from spreading:


Anti-virus software should be installed when the personal computer is initially configured. The software should be updated weekly with new virus definitions, and your vendor may provide an automated update feature. Organizations may benefit from using several brands of anti-virus software.

anti_virus     MultiMedia Demo

    Firewall

A firewall insulates a private network from a public network using carefully established controls on the types of request they will route through to the private network for processing and fulfillment. For example, an HTTP request for a public Web page will be honored, whereas an FTP request to a host behind the firewall may be dishonored. Firewalls typically run monitoring software to detect and thwart external attacks on the site, and are needed to protect internal corporate networks. Firewalls appear primarily in two flavors; application level gateways and proxy servers. Other uses of firewalls include technologies such as Virtual Private Networks that use the Internet to tunnel private traffic without the fear of exposure

firewall     MultiMedia Demo