Illustrated tutorial on Internet security 1.0
Evaluation | 3.40/5 votes - 5 |
---|---|
License | Free |
Version | 1.0 |
Updated | 14.10.2005 |
OS | Windows XP, 98, ME, 2000, 2003 |
Interface | English |
Developer | Mike |
Categories | other - Computer, software |
Downloads (today/total) | 0 / 9 803 |
Size | 2.83 Mb |
Illustrated tutorial on Internet protection - When a tree falls in the forest and no one is nearby, in any case, there is a loud crack. However, if a computer network contains a flaw in the security system and no one knows about it, then at first glance it seems that such a network can be considered reliable. Only the biggest idealist can argue with this statement, but very soon you will see that everything is not so obvious.
A network with a flaw in the protection subsystem turns out to be unprotected for those who are aware of this breach. If no one knows about it, i.e. the flaw has not yet been detected, then we can assume that the network is safe. If at least one person finds out about this weak point, the network will become vulnerable to him, but it will still be protected from everyone else. If the equipment manufacturer becomes aware of the defect... If the specialists of any research group find out about it... If this information gets into the hands of the hacker community... In any of these situations, the vulnerability of the network will increase many times and this news will instantly become public domain.
Is this really the case? The flaw exists regardless of whether anyone knows about it or not. The publication of materials on this subject does not directly lead to the insecurity of the network. Such a statement can be confusing. The publication of materials increases the likelihood that a hacker will take advantage of this weak spot, but this does not characterize the flaw itself in any way. At the same time, information messages also increase the likelihood that appropriate countermeasures will be taken. Just as an attacker will not be able to take advantage of an unknown flaw, so it will be impossible to protect the network until its weak point becomes known.
The book is designed in the Windows Help format (*.chm).
Other similar programs
Mail.ru Agent 2022 download the latest version for free
Mail.ru Agent 2022 download the latest version for free
6118 | Free