Abstract

We discuss the use of firewalling method and intrusion detection method, which can be applied both separately and together to computer systems and networks, to expedience of the use of that or other method, tools, that perform these methods. We will try to carry out the analysis of the modern state of security questions in computer networks, to give recommendations how to attain the greatest level of protection of computer systems and networks by most effective way - within the shortest time interval, with minimum financial expenditures

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call