Relatively Weak File Transfers
All different kinds of security solutions have already been introduced and have been used to protect against
1) direct attacks
2) detect and treat malignant codes and viruses
3) protect document and database, etc.
Except the file transfer area, IT security has been continuously strengthening. Thus, more security threats are present because the file transfer area can be exploited easier than other IT areas.

No comments:
Post a Comment