Return to site

What does mac stand for in information security

broken image
broken image

Information Security is not only about securing information from unauthorized access. Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter).Difference between Secure Socket Layer (SSL) and Transport Layer Security (TLS).Difference between Active Attack and Passive Attack.Active and Passive attacks in Information Security.Difference between Cyber Security and Information Security.Approaches to Information Security Implementation.Approaches to Intrusion Detection and Prevention.Secure Electronic Transaction (SET) Protocol.ISRO CS Syllabus for Scientist/Engineer Exam.ISRO CS Original Papers and Official Keys.GATE CS Original Papers and Official Keys.