Enterprise SSO products are designed for large companies with a heterogeneous, distributed computing environment consisting of many systems and applications.…
When building wireless networks, there is also the problem of ensuring their security. Whereas in conventional networks information is transmitted…
The following information can serve as objects of protection in the framework of computer networks: in the elements of the…
The set of programs designed to solve problems on the SVT and in the AU is called software (SW). The…
Penetration testing is a security assessment method consisting in modeling an attack by an attacker to detect vulnerabilities in the…
Protection against computer viruses is a separate issue, the solution of which is the subject of many books, textbooks and…
Basic concepts The idea of strong authentication implemented in cryptographic protocols is as follows. The verified (proving) party proves its…
A firewall is a specialized firewall complex, also called a firewall or firewall system. ME allows you to divide a…
Audit refers to the use of automated mechanisms that cause the creation and storage in a secure computerized log of…