These are the step to prevent from hacking
.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding
Encipherment
is type of security mechanism in Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
it maintain the authenticity and intigirity in digital signature when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential and which is not and in this manner we control the access to data
and manage that which data are for public access and which data is private access
Authentication exchange
Authentication exchange are used for to identify the authenticated user by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer
.Encipherment
. Digital signature
.Access controle
.Authentication exchange
.Traffic podding
- .Routing control
Encipherment
is type of security mechanism in Which we hide actual data and we do not show real and actual data
In another mechanism which is the
digital signature
it maintain the authenticity and intigirity in digital signature when sender send the data it generate a key and attached with message the key is only for authenticated receiver and when receiver get the message use the key to decode or decrypt it
Access control
In this mechanism we give the priority that which data is highly confidential and which is not and in this manner we control the access to data
and manage that which data are for public access and which data is private access
Authentication exchange
Authentication exchange are used for to identify the authenticated user by the information exchange
Traffic podding
In this mechanism we hide some data packet from the path so the hacker can not access full data in this mechanism hacker even do not understand what is actula source of data transmission
Routing control
To prevent hacking threat we use routing control it mean when we data transfer router uses many different way to get deliverd at destination in this hacker typically get access to data with help of routing control we can use different path for data transfer
No comments:
Post a Comment