1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
patriot [66]
3 years ago
6

Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen

ario where the use of DPI may be considered a privacy concern.
Computers and Technology
1 answer:
Lera25 [3.4K]3 years ago
7 0

Answer:

Answered below

Explanation:

Deep packet inspection is a kind of data processing that thoroughly inspects data sent over a computer network and acts on it by rerouting, logging or blocking it. Uses of DPI include;

To ensure that data is in the correct format, internet censorship, to check for malicious code, and also eavesdropping.

DPI uses port mirroring and optical splitter to acquire packets for inspection. It combines the functionality of an intrusion detection system and intrusion prevention system with a traditional stateful firewall.

DPI is therefore helpful in perimeter security by keeping unauthorized users out and at the same time protecting authorized users from attack. Privacy concerns have been raised over the inspection of content layers of internet protocols such as in the case of censorship and government regulations and control.

You might be interested in
Universal Windows Platform is designed for which Windows 10 version?
Naddika [18.5K]

Universal Windows Platform is an open source API created by Microsoft and first introduced in Windows 10. The purpose of this platform is to help develop universal apps that run on Windows 10, Windows 10 Mobile, Xbox One and HoloLens without the need to be re-written for each. It supports Windows app development using C++, C#, VB.NET, and XAML. The API is implemented in C++, and supported in C++, VB.NET, C#, F# and JavaScript. Designed as an extension to the Windows Runtime platform first introduced in Windows Server 2012 and Windows 8, UWP allows developers to create apps that will potentially run on multiple types of devices.

6 0
3 years ago
In one paragraph, explain how understanding social media influencing tactics has impacted the way you see social media posts in
Fofino [41]

Answer:

Social media influencing tactics has impacted the way I see social media posts in your daily life in the sense that if influences what posts I see and what posts I interact with.

Explanation:

Some examples of social media influencing tactics include ads, videos, social media influencers and so on.

When for example, and ad pops up on my social network and I click on it, similar ads of different products would appear later on my social network. In this way, my interaction with that ad has brought up similar ads to my attention. Likewise interaction with videos and social media influencers. When i interact with one video or social media influencer, a similar video or social media influencer is brought up to my attention in my feed.

4 0
3 years ago
What is data that originated in another program or format?
Sergeeva-Olga [200]

Answer:

EXTERNAL DATA

Explanation:

EXTERNAL DATA

DDDDDDD

6 0
3 years ago
Protecting a sheet means ?
larisa86 [58]

To prevent other users from accidentally or deliberately changing, moving, or deleting data in a worksheet, you can lock the cells on your Excel worksheet and then protect the sheet with a password.

8 0
2 years ago
Which of the following tool tab have more than one related subordinate tab??
Juliette [100K]
Table tool? i think because it gives more info
8 0
3 years ago
Read 2 more answers
Other questions:
  • Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
    6·1 answer
  • Tech A says that no matter which way the vehicle turns, the inside wheel must always turn less sharply than the outside wheel. T
    7·1 answer
  • In Java.Use a single for loop to output odd numbers, even numbers, and an arithmetic function of an odd and even number. Use the
    7·1 answer
  • Difference between entropy and enthalpy is
    9·1 answer
  • Declare an array named a of 10 elements of type int and initialize the elements (starting with the first) to the values 10, 20,
    13·1 answer
  • The Windows Operating System: A) is a web-based operating system for the Internet era. B) is a data management application used
    15·1 answer
  • Hyper-Tech Enterprises manufactures mechanical parts used in air conditioning and heating units. The company employs over 300 wo
    13·1 answer
  • The stub: transmits the message to the server where the server side stub receives the message and invokes procedure on the serve
    8·1 answer
  • What type of virus was the "lloveyou" virus?<br> 1.Trojan<br> 2.Worm
    10·2 answers
  • PLEASE PLEASE PLEASE PLEASE help me Im completly lost will give brainliest and 50 points
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!