-
Book Overview & Buying
-
Table Of Contents
CEH v10 Certified Ethical Hacker Study Guide
By :
There was a time when applications ran on a single system. This goes back to the mainframe days when users would connect to the mainframe and run their programs there. Everything related to the program, including any data requirements the program may have had, existed on a single system. There were controls in place on that system to prevent unauthorized access, especially since there was a single point of entry to that system. Following along to the days of the personal computer, before they were attached to networks, programs ran on a single system. Data was also stored along with the program and the system. Once systems became connected to networks, possibilities were expanded. Data could be stored somewhere other than on the system where the program was running. Also, the user didn’t even need to be on the same system where the program was running. Everything could be segmented.
Beyond the segmentation, there is also network geography to consider...
Change the font size
Change margin width
Change background colour