Protection of data communications in distributed computing systems

Protection of data communications in distributed computing systems

Вид работы:   |   Предмет работы:   |   Количество листов: 47

First, the analysis of potential threats in computer networks in the implementation of software abuse, and secondly, research and analysis of methods and means of protecting information, and, thirdly, the features of protecting information in a separate corporate network. As a starting point for the investigation of the selected problems, I used materials from open Internet publications, as well as works: Biyachueva TA, Yaseneva VN, Bezbogova AA, Isaeva AB, Lukashina VI, Rodicheva Yu.A., Khoreva PB, Shanguina VF and etc.


INTRODUCTION
CHAPTER 1 THEORETICAL FOUNDATIONS OF SECURITY AND INFORMATION PROTECTION IN COMPUTER NETWORKS
1. Problems and features of information security in computer networks
2. Threats, attacks and channels of information leakage
3. Classification of methods and means of ensuring security
CHAPTER 2 ANALYSIS OF VPN TECHNOLOGY AND ITS EXPLORATION
2.1 Concept and classification of VPN networks, their construction
2.2 Overlay model and its features
2.3 Peer Model, its advantages and implementation difficulties
CHAPTER 3

CONCLUSION










ПОМОЩЬ С НАУЧНОЙ РАБОТОЙ

Подготовим для Вас работу по стандартам Вузов

Готовая работа с высокой уникальностью по минимальной цене
Срок выполнения от 2 часов
Антиплагиат более 70%

Быстрый заказ работы





[honeypot 2Mp1wUz2rkcR2jj1Ahxo]

Мы перезвоним через 5 минут

Яндекс.Метрика

Error: Please enter a valid email address

Error: Invalid email

Error: Please enter your first name

Error: Please enter your last name

Error: Please enter a username

Error: Please enter a password

Error: Please confirm your password

Error: Password and password confirmation do not match