Question

In: Computer Science

4) Describe the following security mechanisms: a. Authentication b. Authorization c. Accounting (Auditing) d. Data encryption...

4) Describe the following security mechanisms:

a. Authentication

b. Authorization

c. Accounting (Auditing)

d. Data encryption

e. Packet filters

f. Firewalls

g. Intrusion Detection Systems (IDS)

h. Intrusion Prevention Systems (IPS)

Solutions

Expert Solution

Answer:------------

a. Authentication:- Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.

b. Authorization :-- Authorization is the process of giving someone permission to do or have something.

c. Accounting (Auditing):-- Accounting involves tracking, reporting, and analyzing financial transactions. It covers everything from preparing individual tax returns to preparing financial statements for multinational corporations, and is considered a fundamental discipline within the field of accounting.

d. Data encryption:-- Data Encryption is a process that encodes a message or file so that it can be only be read by certain people. Encryption uses an algorithm to scramble, or encrypt, data and then uses a key for the receiving party to unscramble, or decrypt, the information.

e. Packet filters:--- Packet filtered is an ICMP response that indicates that the ping request was actively responded to with something other than icmp reply. Most likely cause is that the router, or some other router en-route rejected the request with icmp prohibited.

f. Firewalls:-- A firewall is a network security system that monitors and controls over all your incoming and outgoing network traffic based on advanced and a defined set of security rules.

g. Intrusion Detection Systems (IDS):-- An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.

h. Intrusion Prevention Systems (IPS):--- An intrusion prevention system (IPS) is a form of network security that works to detect and prevent identified threats. Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents and capturing information about them. The IPS reports these events to system administrators and takes preventative action, such as closing access points and configuring firewalls to prevent future attacks. IPS solutions can also be used to identify issues with corporate security policies, deterring employees and network guests from violating the rules these policies contain.


Related Solutions

Briefly describe the following: a. Committee on Accounting Procedures b. Committee on Accounting Terminology c. Accounting Principles Board d. Financial Accounting Standards Board
Briefly describe the following:a. Committee on Accounting Proceduresb. Committee on Accounting Terminologyc. Accounting Principles Boardd. Financial Accounting Standards Board
For the reaction A + B + C → D The following data were obtained at...
For the reaction A + B + C → D The following data were obtained at constant temperature: Trial Initial [A] (mol/L) Initial [B] (mol/L) Initial [C] (mol/L) Initial Rate (mol/L . s) 1 0.2790 0.1670 0.0334 1.190 2 0.5580 0.1670 0.0334 2.381 3 0.5580 0.3340 0.0334 9.524 4 0.2790 0.1670 0.0668 1.190 1. What is the order with respect to each reactant? (Enter the order for A as Answer 1, that for B as Answer 2, and that for...
Find the value of a : b : c : d, if a : b = 2 : 3, b : c = 4 : 5 and c : d = 6 : 7.
Find the value of a : b : c : d, if a : b = 2 : 3, b : c = 4 : 5 and c : d = 6 : 7.
Given A*B*C and A*C*D, prove the corollary to Axion B-4.
Given A*B*C and A*C*D, prove the corollary to Axion B-4.
1. Evaluate: (a+b)/(c-d) + 9/(a+d) when a=5, b=3, c=8, d=4 a. 6 b. 3 c. 15/2...
1. Evaluate: (a+b)/(c-d) + 9/(a+d) when a=5, b=3, c=8, d=4 a. 6 b. 3 c. 15/2 d. 17/13 2. Solve for x: 5(x+3) = 35 a. 2 b. 7 c. 4 d. -4 3. Acid rain occurs primarily as a result of a. operating a nuclear power plant b. burning coal or oil containing sulfur c. by-products created by operating an oil refinery d. the use of Freon and other refrigerants 4. The "ozone holes" at the polar region arise...
Describe the 4 stages of team development A) Forming B) Norming C) Storming D) Performing in...
Describe the 4 stages of team development A) Forming B) Norming C) Storming D) Performing in paragraphs.
Data Analytics Accounting Describe the challenge faced in auditing inventory during the coronavirus pandemic. Describe the...
Data Analytics Accounting Describe the challenge faced in auditing inventory during the coronavirus pandemic. Describe the possible solutions to this challenge.
Randomly pair 4 keys {a, b, c, d} with 3 locks {a, b, c}. What is...
Randomly pair 4 keys {a, b, c, d} with 3 locks {a, b, c}. What is P(at least one match)?
For each of the following simplicial complexes ,X = {[a], [b], [c], [d], [a, b], [c,...
For each of the following simplicial complexes ,X = {[a], [b], [c], [d], [a, b], [c, d]}, and X = {[a], [b], [c], [d], [e], [a, b], [b, c], [c, d], [a, d], [a, c], [a, e], [b, e], [a, b, c]},give a basis for each non-zero Hj(X).
Consider the following propositional formula: (((A ^ B) -> C) ^ ((A ^ C) -> D))...
Consider the following propositional formula: (((A ^ B) -> C) ^ ((A ^ C) -> D)) -> ((A ^ B) -> D) Perform the following tasks for this formula: Convert this formula into CNF form and write a numbered list of all clauses obtained from this formula.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT