Answer the question
In order to leave comments, you need to log in
Information security or what is taught in universities?
Hello.
I had to get your attention. Knowing that the same questions were asked before me, /#boring #banal #stupidly #how tiredTheseStudents/, but still I'll forgive you for understanding my request
... I still can't decide on a theme. Probably due to the fact that my vector of interests is slightly shifted from IB. Or maybe he realized late that a university does not provide anything truly useful that could help a person go in some particular direction / what is IB and what to prepare for /.
Help please with the topic, I would like something related to the database, networks and web development. I love programming in Java & C++. Thanks in advance!
Answer the question
In order to leave comments, you need to log in
The algorithm is something like this:
1. First of all, you need a company. Find a person through your acquaintances who can sign the implementation act for you. On the edge of me, knock on the mail,
2. Next, you make some small CRM-ku.
For example, there is a store, some customers make an advance payment, and the organization gives them a 10-20% discount on the retail price for this. An agreement is concluded with such clients, invoices are signed, etc. Since the contract contains personal data
, in accordance with
152 -FZ they need to be
protected work, you write that they say I developed a secure exchange systeminformation based on ( ... think further for yourself what .... )
5. As a result, you will have a client-server application (DBMS in the cloud, windows on a PC) in C # / Java, the data between the client and the server is encrypted, the entrance is carried out with using a token.
After the defense, as happens in 90% of cases, you will throw away your work and get a piece of paper called " DIPLOM ", and now the diploma does not even say that you received a higher education, just a DIPLOMA ... And now, having received it, you become unemployed. ... Profit :-)
PS: unemployment benefit for university graduates is 850 rubles...
I have always been interested in the topic of database encryption. Those. When everything seems to be closed, but the data in the database is still encrypted. So that if they stole the data, they didn’t get anything useful at the output. What kind of data is this, what can be kept openly. How to encrypt correctly so as not to give a load. Then the question of storing personal data is interesting, we know that it is impossible to store something. Tell what can be stored, and what can not be stored at all, and what is possible, provided, in what cases it is possible, what is needed for this. What are the resource requirements? On the example of the same credit cards, I read something on Habré about eBay and its daughter paypal. When there was a hack and they discussed just data on accounts and cards.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question