International Journal of Academic Engineering Research (IJAER)
  Year: 2021 | Volume: 5 | Issue: 1 | Page No.: 14-21
Establish Network Protection
Usmonov Makhsud

Abstract:
In order to process confidential information, it is necessary to use computers that have passed the necessary verification. It is important that the protective equipment is fully functional. In this case, the work of the system administrator and the control carried out are of great importance. For example, users change passwords frequently and the length of passwords makes it difficult to identify them. Therefore, it is important to limit the registration of a new user (for example, only during working hours or only at the company where he works). It is necessary to make a feedback (for example, using a modem) to verify the authenticity of the user. It is possible to use the mechanism of restriction of access to information resources and its effect on LAN objects.