Request-Response Technique
An intruder may attempt to prevent or delay the receipt of a message from the sender. When senders and receivers are not in constant contact, the receiver may not know if the communications channel has been interrupted and that messages have been diverted. Using request-response technique, a control message from the sender and a response from the receiver are sent at periodic, synchronized intervals. The timing of the messages should follow a random pattern that will be difficult for the intruder to determine and circumvent.
Call-Back Devices
As we have seen, network can be equipped with security features such as passwords, authentication devices, and encryption. The common weakness to all of these technologies is that they apply the security measure after the criminal has connected to the network server. Many believe than the key to security is to keep the intruder off the network to begin with.
Request-Response TechniqueAn intruder may attempt to prevent or delay the receipt of a message from the sender. When senders and receivers are not in constant contact, the receiver may not know if the communications channel has been interrupted and that messages have been diverted. Using request-response technique, a control message from the sender and a response from the receiver are sent at periodic, synchronized intervals. The timing of the messages should follow a random pattern that will be difficult for the intruder to determine and circumvent.Call-Back DevicesAs we have seen, network can be equipped with security features such as passwords, authentication devices, and encryption. The common weakness to all of these technologies is that they apply the security measure after the criminal has connected to the network server. Many believe than the key to security is to keep the intruder off the network to begin with.
การแปล กรุณารอสักครู่..
