Recent questions in Computer Security

No documents found, press Enter to search

Why Does most of the online Tutorial teach how to how on Vmware the real Pc ?

I have seen so many people who teach CEH using Vmware when it come to demostration
1
faylin-avatar
about 12 years ago

What are the main features of Evaluation of Computer Security?

Hi I need to enlist some features of computer security in my report. Please provide relevant material.
3
faylin-avatar
about 12 years ago

What are the main criteria for IT and security evaluation?

Hi I am preparing a report on computer security and I need to understand the basic criteria for it. Please help.
3
faylin-avatar
about 12 years ago

Which evaluation parties are involved in system security evaluation?

Hi need to enlist some parties, which are directly involved in security evaluation of computer system, in my presentation. Please enlist them.
4
faylin-avatar
about 12 years ago

What is meant by Security Assurance?

Hi I am giving a presentation on computer security and I need some material the can explain security assurance for a computer system. Please help.
2
faylin-avatar
about 12 years ago

What is Trusted Platform Module (TPM)?

Hi I am studying about computer architecture and I am having trouble in understanding the features of TPM. Please provide some relevant material.
3
1-6 of 56
obesix-avatar
about 12 years ago

What is the purpose of Firewall?

I want to work on a firewall project. Please instruct me a little that firewall exists in software state or a hardware state as well.
6
obesix-avatar
about 12 years ago

Does Firewall exist in computers on any other device?

My research area belongs to system security and management. Inspire of computer I want to work on any other device. Please instruct me.
6
obesix-avatar
about 12 years ago

What should be the management scheme to make a system protected through firewall?

I have to make a design and project report. I am little confused about the contents which I have to explain there.
6
obesix-avatar
about 12 years ago

How can I draft or arrange security policies?

There may be number of threats to a computer or any other hardware device, I want to make security policies.
6
obesix-avatar
about 12 years ago

What are the common areas of attack?

I have to list some common areas which can be affected by Intruders or hackers in my presentation.
6
hambery-avatar
about 12 years ago

Which ports should be protected from hackers?

I have a firewall installed in my computer. I want to completely secure my PC from any type of threat. I also want to block every unusual port.
6
1-6 of 56
Computer Security