0 ratings0% found this document useful (0 votes) 22 views7 pagesNS Assignment 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
of 055
jnectunte
Airchite je —Conab
Security
sin___brief. - model
nection)
5 The 05SEC Gen. Systenn_—“Latercor suite hour.
® 2 aerotanc. one ai | G
fromeuserk __usesl sda uns regghame oonoberacks \ e
cfigferent network protocols and. Cue in tne tonto} Tr
. » httect
When __aliscussin, securlits ote es and.
j eo au
of OSI, we generally veer to the a noch lage
mechanterns___put_—sia place —— do S80 ‘sfelp _pwwxtre,
% the _0SL___rmactel - Has 8 eae ch Layone
a each bays:
Mfeur of, __ecuntlty. canciderations —for—* ef
“h. Physteal__Loyer (Layer D+ ——— res ~
Same grees —sontral cto
© Secumitty focuses —on— ~ pl teal
nebo. Secuntliy = “deste,
____2- Data Lint — ager Lage
+E nsuies __clerta.___‘Inte =
___s- Netusorke Layne ea
+ Security —_Tnuolves — apsee (Ink
cmdhentization 2
and — 2 contr)
ee “ehotypkion _ond
—seeuy— Y Itke oer ox _B4P),+
jutas YU (Adis) on routers
4 “Teonsport Royer Uncipos 4?
+ Qouvfty _measunes ___sJoclude _oktans
Jims 48) __ secuie ___communf (09
_Afre wall rules based on
5» Session dausn (Layer S: eos \
te at
= + Socysftty can __‘nvolve__sessfon nf ackins _prevention ail
dechrfiqués __Such___a ecslon __dokens Hirseout:
|
_____,6 Presentation Layer Chayer ) + - + =
Beals with data __forniing _, Cornptesston _8 _ eomyption 1
Je Secwiity — ‘Scludes _data_~_validation _,_ data __comversion
1 enowption | ceoryptian _Mechonams- een7. Application Layer Layer D+
+ Geewitty focuses on. oulhentt cation __nechantsrns. (Uke
QAuth ‘er LOAP)_, secure APIs, secine coding
_-practices and. application - level enviyption=
qnvolves__‘fenplernenting
The —-Gecurtly —_architectuxe for
specific ecual measunes + -sach__staysr__sto
Lpmbech the _nekwark. __ Snfrastruchwte__) clad ow
= : “integrity —__Pronn__ventfons_cthhreats_ Such os
es ___ dato Sntercepkien and. “malicious attack
the process — ime werify sing the
| Sent yh Q___user__oy___gustern attempt ¢ to 4
a fundarnentat
Th eccons __ resources _es_ Services -_Ht.
——_cyperserstity and. ts — _ctudal for ensuing
- audborizedl _entitfes _can access — protected.
SE. porte —spedfic — _eictions - ___—
et _ospects of __authentication __fnclude +
identification: see we arias oe
i. —Systern — provide ___a- unique _fdentipter
watt 3 Such__as— __usetname_,eradi|__address_, or thot
__dhe authentication —_process-
contefi
igs Nari icerbionn § oo
This Involves __conffenfng_-that__tine— prowicleeh Rdentt-
em:
__|ifter _ matches _a.___Rnown Identity _ within co 6
- Authentication factor
Authentication Con __— Poly 290.
ldo establish — Identity - a ae
see Something che _user__RnowS
cate > +o. beqir
Mote oe nore. faders
Co.Smaak
ger has Leg
faciers -Sometbing—ane— ust
tor)
conde, token generate" oy ts ae
+ _Tnherence factors Somaettg 2
bfomeiria stata!
12 \
4. Puthenkicatton Methods
; snnologtes—fisedl
“There are —vavlaus— peetnnds one 2% ni
icatie luatng + iets
[yor authentication ,Sncluaing am
+ Single = facie "authentication —CSFA)
fasion —t “ f assusotd) + jit : _ i _
“| Secoutiyy —Tenpltcatiens + mae on
t ized —
“Proper authentication _hellps —prevert __ gunattborts a -
~ db
acceso , lata — _breachee and. _Baeniity — he _e
Sotorreniio®
__levuctal jos _—_protecting-—
ond nekwereks —__#feamon —
3 [tari wile
dhe context —
Ans | Integrity sin _—s
____| data management» Tehsrs 2
jclata remains, oceunate 2 agictent , and
ie Te sig one, Abe —__|_—
|
tiny throughout 4s.
oformaton — secwtity oe
core prindples
alongside confi ancl __oNailabt ity - ___—— \
Jd J al
Hey aspects of dato. integatity Paeludevt a
“ye Bato Accustacy + — seg ye elit —
___ | Ensuring __-that data fe correct ane). tee finan ——
letrots — “pt __alitrations , oth fntentional and unint-
| enticmesl So ee
_ lla: Consistency? —____ plicd
Data oes -_enswies that __Snfarmaton remalns
over time ond ___Qexossalfferent__systems ov _ processes
3 Protecion Against Onaulherigad TMadification
“nigyitty _roensues__prevent___unauthortgeel
ell@rations clo ___dlata__, _.ahsuailog_—_that_— onl
modify __fnformation
ot __malidous
audooryed
jmsers or systems __can_
Ae .Nerification “ancl Validation 1 oni
i Techniques stich checksums, nadurtes,
sind —-ouyptegraphis.._chashing. ove wstidye
ia___anel —sTndeqotity _—__—
Ampexdance i __Tatust
among:
intcante
S
Atokeholduis , ox sit _onsuried _ that
user,
__edn be _telieck.
___.Soformation _3s__teliable
aban i
_ | opssiational _
Techn olegtcal _‘Measusieg® ¢
4Antegetly _corttrolg_axe _ Rapier cuted. — cthewough.
Lonviyption » fs
Access —_Contmal fu) |
Security ond spedpic |
can access.
actions —_uitiin.
pla: a cxudal
los ond
by euentin
pacuenting
misus
Het
___prantigg or
baseck” on
Mune) of, _tugerts__O*
21, Components
= ___+ Authentication
System attempting #0
Aatexrafr’
A rs ea al
# Authorization 3 dhe permissions. and _pritlegs Hl
iguanted to based on \
predefined.
* Accounting *
dagen
~ pustposes — ai
2! Types — Paton
is Mandeton Accose Contra!
|. Bisvretiomony access _Corrtial _ SONA ese
|) Role - Based’ Access _Control (gga sss 8
|) Allribute = Based Access _Cimtrol_CAGAC) _ ees 4+ heast — pwotlege
_ + Need = do. Rnour
Sepiration of, Duties
4mplenesst ation
Access — contra! _ mechanisms __oxte
authentication
Amplersentec. sthaough.
methods,
Liard)_Syatems.
“technologies Auch as
anc access managernint
ping —_prrosiicus—
soding ft
>And _ Recuste
fi ampextenc +
ne epg tie — Occess
ne fis —2},-
__idinsidee _thnenis
thes oxiganigationm _mitigale 4
___access_, slate breaches >}
Jompliane violations
___ A, Explain the —
‘Ans_|Active —“altacles
| Acuully ___efyet_to
pated attempts sta.
sate, ysis wt ___netioark —_trabiie __4o_ackiewe
7 apectia “goal. —ypteally to — fn__unarahgac.
‘teat __fnfermation:
computer —_—
_malidous actions —_tahew 20
st __manipulatiene
fee | 0 ccess 5 smut Aexvices 5 OC
é || Blote awe Some ____coaman_types _B}_—_aciive
‘ _|| attacks? a .
“Dontal~ of - Service DoS) and —_Biistributed _ Denial =o;
Service __ (DDoS) Attacks *
Floods an Bytom _, Berar 4 A
— _ Dos —_Fittacke.
z “T netoorke ith —_sneasstve. —_stoquesie,_maklyg
unavailable. cto ____-slegiltmate ausers-
1» DDoS __attack_: see rmulliple comprorsisect
dhe target with __ rah hic y awertichale = mi )_pitack + ~ ae
3. Manz Sia - Ahe 2 riddle cmt: re aos or ' yy,
+ Cornmen in unsearedl { ty
comprornised. scouters. . 1
: 5 | tt
x, Pocet sniff = ike soon tae}
Te. __cottaining BED
[ide _caphusie dato packeks- o a
| ibfonmmertion like —
is padboTlgey: |e
4: | Session Httfacking +
The __orttackex.
| Mntmeepting 4
5. || DNS Spdoh
S| DSS _Sphefigg —t
Manfpulartes
dp stedfroct ass
—— __falstfyin f= __DNS_
6: || Sqn sfaj action $
+ @xplofts _— vulnexal
bat uses“ SQL
tode nto are Wk oelagGae |
malidous SOL E
41:1) Goss, a Sudpotin (xss)z
| Snjegd malicious “ seuipts inte —
bu / othex uses» _—______—
tes tn
databases
« €tibesdlaonpsing + bales
"fee at getning — Jensitive _Infermaken twithed |
sidir's -erowleds 1 wary eee 4
—————+
4, 3
tet Offcn__used _ eh oteal Sp tae Hoanéal Gagne
ee om |
oe 4
games n_slre more slate. Jn «4
hold + |