Answer:
The technique of securing an individual system from attack. Host based security is operating system and version dependent.
Previous Question | Next Question |
What is Insider Attack? | Explain How the the two servers can communicate when the firewall is there in between? |