Recent questions in Computer Security

Computer Security
shyrman
What defense is used for worms in computer networks?
Hi I am preparing a presentation on computer security and I need some points about protection against worm.
faylin
What are the main features of Evaluation of Computer Security?
Hi I need to enlist some features of computer security in my report. Please provide relevant material.
faylin
What are the main criteria for IT and security evaluation?
Hi I am preparing a report on computer security and I need to understand the basic criteria for it. Please help.
faylin
Which evaluation parties are involved in system security evaluation?
Hi need to enlist some parties, which are directly involved in security evaluation of computer system, in my presentation. Please enlist them.
faylin
What is meant by Security Assurance?
Hi I am giving a presentation on computer security and I need some material the can explain security assurance for a computer system. Please help.
faylin
What is Trusted Platform Module (TPM)?
Hi I am studying about computer architecture and I am having trouble in understanding the features of TPM. Please provide some relevant material.
faylin
What are the services provided by Trusted Platform Module (TPM)?
Hi I am studying about Computer development and I need some information about the features offered by TPM. Please help.
1-6 of 55
obesix
What is the purpose of Firewall?
I want to work on a firewall project. Please instruct me a little that firewall exists in software state or a hardware state as well.
obesix
Does Firewall exist in computers on any other device?
My research area belongs to system security and management. Inspire of computer I want to work on any other device. Please instruct me.
obesix
What should be the management scheme to make a system protected through firewall?
I have to make a design and project report. I am little confused about the contents which I have to explain there.
obesix
How can I draft or arrange security policies?
There may be number of threats to a computer or any other hardware device, I want to make security policies.
obesix
What are the common areas of attack?
I have to list some common areas which can be affected by Intruders or hackers in my presentation.
hambery
Which ports should be protected from hackers?
I have a firewall installed in my computer. I want to completely secure my PC from any type of threat. I also want to block every unusual port.
1-6 of 55