Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
22 views7 pages

NS Assignment 1

I need that pdfjjvyvyv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
22 views7 pages

NS Assignment 1

I need that pdfjjvyvyv
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
of 055 jnectunte Airchite je —Conab Security sin___brief. - model nection) 5 The 05SEC Gen. Systenn_—“Latercor suite hour. ® 2 aerotanc. one ai | G fromeuserk __usesl sda uns regghame oonoberacks \ e cfigferent network protocols and. Cue in tne tonto} Tr . » httect When __aliscussin, securlits ote es and. j eo au of OSI, we generally veer to the a noch lage mechanterns___put_—sia place —— do S80 ‘sfelp _pwwxtre, % the _0SL___rmactel - Has 8 eae ch Layone a each bays: Mfeur of, __ecuntlty. canciderations —for—* ef “h. Physteal__Loyer (Layer D+ ——— res ~ Same grees —sontral cto © Secumitty focuses —on— ~ pl teal nebo. Secuntliy = “deste, ____2- Data Lint — ager Lage +E nsuies __clerta.___‘Inte = ___s- Netusorke Layne ea + Security —_Tnuolves — apsee (Ink cmdhentization 2 and — 2 contr) ee “ehotypkion _ond —seeuy— Y Itke oer ox _B4P),+ jutas YU (Adis) on routers 4 “Teonsport Royer Uncipos 4? + Qouvfty _measunes ___sJoclude _oktans Jims 48) __ secuie ___communf (09 _Afre wall rules based on 5» Session dausn (Layer S: eos \ te at = + Socysftty can __‘nvolve__sessfon nf ackins _prevention ail dechrfiqués __Such___a ecslon __dokens Hirseout: | _____,6 Presentation Layer Chayer ) + - + = Beals with data __forniing _, Cornptesston _8 _ eomyption 1 Je Secwiity — ‘Scludes _data_~_validation _,_ data __comversion 1 enowption | ceoryptian _Mechonams- een 7. Application Layer Layer D+ + Geewitty focuses on. oulhentt cation __nechantsrns. (Uke QAuth ‘er LOAP)_, secure APIs, secine coding _-practices and. application - level enviyption= qnvolves__‘fenplernenting The —-Gecurtly —_architectuxe for specific ecual measunes + -sach__staysr__sto Lpmbech the _nekwark. __ Snfrastruchwte__) clad ow = : “integrity —__Pronn__ventfons_cthhreats_ Such os es ___ dato Sntercepkien and. “malicious attack the process — ime werify sing the | Sent yh Q___user__oy___gustern attempt ¢ to 4 a fundarnentat Th eccons __ resources _es_ Services -_Ht. ——_cyperserstity and. ts — _ctudal for ensuing - audborizedl _entitfes _can access — protected. SE. porte —spedfic — _eictions - ___— et _ospects of __authentication __fnclude + identification: see we arias oe i. —Systern — provide ___a- unique _fdentipter watt 3 Such__as— __usetname_,eradi|__address_, or thot __dhe authentication —_process- contefi igs Nari icerbionn § oo This Involves __conffenfng_-that__tine— prowicleeh Rdentt- em: __|ifter _ matches _a.___Rnown Identity _ within co 6 - Authentication factor Authentication Con __— Poly 290. ldo establish — Identity - a ae see Something che _user__RnowS cate > +o. beqir Mote oe nore. faders Co. Smaak ger has Leg faciers -Sometbing—ane— ust tor) conde, token generate" oy ts ae + _Tnherence factors Somaettg 2 bfomeiria stata! 12 \ 4. Puthenkicatton Methods ; snnologtes—fisedl “There are —vavlaus— peetnnds one 2% ni icatie luatng + iets [yor authentication ,Sncluaing am + Single = facie "authentication —CSFA) fasion —t “ f assusotd) + jit : _ i _ “| Secoutiyy —Tenpltcatiens + mae on t ized — “Proper authentication _hellps —prevert __ gunattborts a - ~ db acceso , lata — _breachee and. _Baeniity — he _e Sotorreniio® __levuctal jos _—_protecting-— ond nekwereks —__#feamon — 3 [tari wile dhe context — Ans | Integrity sin _—s ____| data management» Tehsrs 2 jclata remains, oceunate 2 agictent , and ie Te sig one, Abe —__|_— | tiny throughout 4s. oformaton — secwtity oe core prindples alongside confi ancl __oNailabt ity - ___—— \ Jd J al Hey aspects of dato. integatity Paeludevt a “ye Bato Accustacy + — seg ye elit — ___ | Ensuring __-that data fe correct ane). tee finan —— letrots — “pt __alitrations , oth fntentional and unint- | enticmesl So ee _ lla: Consistency? —____ plicd Data oes -_enswies that __Snfarmaton remalns over time ond ___Qexoss alfferent__systems ov _ processes 3 Protecion Against Onaulherigad TMadification “nigyitty _roensues__prevent___unauthortgeel ell@rations clo ___dlata__, _.ahsuailog_—_that_— onl modify __fnformation ot __malidous audooryed jmsers or systems __can_ Ae .Nerification “ancl Validation 1 oni i Techniques stich checksums, nadurtes, sind —-ouyptegraphis.._chashing. ove wstidye ia___anel —sTndeqotity _—__— Ampexdance i __Tatust among: intcante S Atokeholduis , ox sit _onsuried _ that user, __edn be _telieck. ___.Soformation _3s__teliable aban i _ | opssiational _ Techn olegtcal _‘Measusieg® ¢ 4Antegetly _corttrolg_axe _ Rapier cuted. — cthewough. Lonviyption » fs Access —_Contmal fu) | Security ond spedpic | can access. actions —_uitiin. pla: a cxudal los ond by euentin pacuenting misus Het ___prantigg or baseck” on Mune) of, _tugerts__O* 21, Components = ___+ Authentication System attempting #0 Aatexrafr’ A rs ea al # Authorization 3 dhe permissions. and _pritlegs Hl iguanted to based on \ predefined. * Accounting * dagen ~ pustposes — ai 2! Types — Paton is Mandeton Accose Contra! |. Bisvretiomony access _Corrtial _ SONA ese |) Role - Based’ Access _Control (gga sss 8 |) Allribute = Based Access _Cimtrol_CAGAC) _ ees 4 + heast — pwotlege _ + Need = do. Rnour Sepiration of, Duties 4mplenesst ation Access — contra! _ mechanisms __oxte authentication Amplersentec. sthaough. methods, Liard)_Syatems. “technologies Auch as anc access managernint ping —_prrosiicus— soding ft >And _ Recuste fi ampextenc + ne epg tie — Occess ne fis —2},- __idinsidee _thnenis thes oxiganigationm _mitigale 4 ___access_, slate breaches >} Jompliane violations ___ A, Explain the — ‘Ans_|Active —“altacles | Acuully ___efyet_to pated attempts sta. sate, ysis wt ___netioark —_trabiie __4o_ackiewe 7 apectia “goal. —ypteally to — fn__unarahgac. ‘teat __fnfermation: computer —_— _malidous actions —_tahew 20 st __manipulatiene fee | 0 ccess 5 smut Aexvices 5 OC é || Blote awe Some ____coaman_types _B}_—_aciive ‘ _|| attacks? a . “Dontal~ of - Service DoS) and —_Biistributed _ Denial =o; Service __ (DDoS) Attacks * Floods an Bytom _, Berar 4 A — _ Dos —_Fittacke. z “T netoorke ith —_sneasstve. —_stoquesie,_maklyg unavailable. cto ____-slegiltmate ausers- 1» DDoS __attack_: see rmulliple comprorsisect dhe target with __ rah hic y awertichal e = mi )_pitack + ~ ae 3. Manz Sia - Ahe 2 riddle cmt: re aos or ' yy, + Cornmen in unsearedl { ty comprornised. scouters. . 1 : 5 | tt x, Pocet sniff = ike soon tae} Te. __cottaining BED [ide _caphusie dato packeks- o a | ibfonmmertion like — is padboTlgey: |e 4: | Session Httfacking + The __orttackex. | Mntmeepting 4 5. || DNS Spdoh S| DSS _Sphefigg —t Manfpulartes dp stedfroct ass —— __falstfyin f= __DNS_ 6: || Sqn sfaj action $ + @xplofts _— vulnexal bat uses“ SQL tode nto are Wk oelagGae | malidous SOL E 41:1) Goss, a Sudpotin (xss)z | Snjegd malicious “ seuipts inte — bu / othex uses» _—______— tes tn databases « €tibesdlaonpsing + bales "fee at getning — Jensitive _Infermaken twithed | sidir's -erowleds 1 wary eee 4 —————+ 4, 3 tet Offcn__used _ eh oteal Sp tae Hoanéal Gagne ee om | oe 4 games n_slre more slate. Jn «4 hold + |

You might also like