answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Can neural network be used in information security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

The 2 security methods used on network?

There are two types of network security concerns: network infrastructure security and content security. Securing a network infrastructure includes the physical securing of devices that provide network connectivity and preventing unauthorized access to the management software that resides on them. Content security refers to protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices.


Where can one contact Network Security Appliance?

There does not appear to be a company or website titled "Network Security Appliance" and it is therefore not possible to find a contact address. There are however, appliances which are used within network security and information on these is available from several sites such as Wikipedia.


Is DES algoritgim a Network Security?

Yes, DES can be used for network security, but it is a rather weak one that can be cracked easily.


What does a business network security do?

Business network security is used to prevent and monitor unauthorized accesses to the network and any misuse or modification. It will also impose password security, firewalls, antivirus software, a network analyzer and more.


Why network security needed?

Without network security, anybody could just hack into the network, make adjustments to files, database's etc... Just think about your bank for example. Without network security anybody could just log in and look at your details, transfer money in or out of your account etc...


How is networking security used?

Networking security is used to protect a series of computers connected to a specific network by scrambling the data passed between the network. This renders the data useless outside the network and secure.


What are the u ses of information technology in security?

This very much depends on what type of security you speak of. Information Security is most often categorized broadly but has to do with keeping unwanted people out of servers and end-user computer systems, there are many jobs in the field of security, its best known for its white hat hackers who penetrate computer systems and network in an attempt to better the stability and security of a network. Analysts analyze and manipulate data from routers and servers used to record events in an attempt to find faults in a network.


What server role is used to manage security tokens and security services for a web based network?

Active Directory Federation Services is used to manage security tokens and security services on a Windows Server 2008 Web-based network.


What is a networking specialist?

Network security specialists are computer specialists. They work for organizations to help structure, install and manage information security systems. They work to protect an organization's computer information and prevent the loss of data. They watch for security breaches and respond to them, if necessary.ResponsibilitiesEducation and TrainingThe responsibilities of network security specialists vary depending on the nature of work of their employers. In a small home setting, network security specialists might be hired to install virus protection software and perform ritual cleanups. In a larger setting, such as a corporation, a network security specialist will likely have larger responsibilities. These might include training employees on information security, setting up entire security programs, monitoring information networks for breaches and gathering data to be used in the prosecution of cyber criminals. SalaryNetwork security training is available on many levels. There are certificates that can be acquired through technical colleges, as well as associate's degrees. Also, most four-year colleges offer computer science or information systems degrees, which would qualify you to work as a network security specialist.According to simplyhired.com, network security specialists average $62,000 a year.


What does a sniffer program do?

A packet sniffer uses a network connection in promiscuous mode to receive and record packets that were not intended for that computer. This can be used by a network administrator to monitor a network and find potential security problems. It can also be used by a hacker to access privileged information that is sent un-encrypted through the network.


What is a neural connection?

Training data is used by neural networks to learn and increase their accuracy over time. In computer science and artificial intelligence, these learning techniques can be used to quickly identify and cluster data. When compared to manual identification by human experts, tasks in speech recognition or image recognition can take minutes rather than hours. Google's search algorithm is one of the most well-known neural networks. Learn in detail about neural and network and how they are connected to machine learning from Learnbay institute.


Would you expect WPS to be used when a wireless network is using strong security weak security or no security (as in a public hotspot)?

Strong Security