Question

In: Computer Science

please explain deeply and clearly the security mechanisms to protect the fundamental objective of information security

please explain deeply and clearly the security mechanisms to protect the fundamental objective of information security

Solutions

Expert Solution

The various security mechanisms to provide security are as follows-

1. Encipherment:

This is hiding or covering of data which provides confidentiality. It is also used to complement other mechanisms to provide other services. Cryptography and Steganography are used for enciphering

2. Digital Integrity:

The data integrity mechanism appends to the data a short check value that has been created by a specific process from the data itself. Data integrity is preserved by comparing check value received to the check value generated.

3. Digital Signature:

A digital signature is a means by which the sender can electronically sign the data and the receiver can electronically verify the signature. Public and private keys can be used.

4. Authentication Exchange:

In this two entities exchange some messages to prove their identity to each other.

5. Traffic Padding:

Traffic padding means inserting some bogus data into the data traffic to thwart the adversary’s attempt to use the traffic analysis.

6. Routing Control:

Routing control means selecting and continuously changing different available routes between sender and receiver to prevent the opponent from eavesdropping on a particular route.

7. Notarization:

Notarization means selecting a third trusted party to control the communication between two entities. The receiver can involve a trusted third party to store the sender request in order to prevent the sender from later denying that she has made a request.

8. Access Control:

Access control used methods to prove that a user has access right to the data or resources owned by a system. Examples of proofs are passwords and PINs.

Security services

  • Authentication: assures recipient that the message is from the source that it claims to be from.
  • Access Control: controls who can have access to resource under what condition
  • Availability: available to authorized entities for 24/7.
  • Confidentiality: information is not made available to unauthorized individual
  • Integrity: assurance that the message is unaltered
  • Non-Repudiation: protection against denial of sending or receiving in the communication

Relation between security services and mechanisms

NOTE:- I TRIED TO IMPLEMENT THE QUESTION WITH BEST OF MY UNDERSTANDING .....IF YOU NEED ANY OTHER HELP REGARDING THIS QUESTION PLEASE DO MENTION IN COMMENTS ......IF YOU GO ANY SORT OF HELP PLEASE UPVOTE......


Related Solutions

please explain the 2 mechanisms that protect the stomach from being digested
please explain the 2 mechanisms that protect the stomach from being digested
****Please clearly explain what target objective, changing cells and constraints are taken for the solution********* A...
****Please clearly explain what target objective, changing cells and constraints are taken for the solution********* A political candidate has an advertising budget of $250,000. The candidate wishes to allocate the advertising money among four media outlined in the table below. The candidate's goal is to reach the largest possible audience. To ensure the candidate reaches a diverse audience, the table also displays a minimum and maximum level of ads that should be placed. Use Excel's solver to assist the candidate...
Explain two fundamental concepts; why information security is a management issue, and the time-based model of...
Explain two fundamental concepts; why information security is a management issue, and the time-based model of information security.
Explain the responsibilities of marketers to protect customer privacy and data security.
Explain the responsibilities of marketers to protect customer privacy and data security. 
Digital security is an increasing concern is the Internet age. In order to protect sensitive information...
Digital security is an increasing concern is the Internet age. In order to protect sensitive information online, what are the methods for enhancing digital security? Select one method and describe in detail how it is implemented and how you would implement it to protect your online data.
1. Explain the three fundamental economic questions of What, How and for whom, stating clearly the...
1. Explain the three fundamental economic questions of What, How and for whom, stating clearly the considerations that determine each question by answering: a. What goods and services will be produced? b. How will the goods and services be produced? c. Who will get the goods and services produced?
There are 4 main mechanisms by which antiulcer drugs work . Please explain these four mechanisms...
There are 4 main mechanisms by which antiulcer drugs work . Please explain these four mechanisms of actions in your own words, in a way that anyone - even people who have not taken this course - would understand. These mechanisms are summarized in Figure 31.4 in your textbook but remember to use your own words to receive credit for this post. (NOTE: 200--400 words)
A security policy is a document that states how the organisation plans to protect the organisations information Technology assets.
A security policy is a document that states how the organisation plans to protect the organisations information Technology assets. In your own words, state how a security policy affects the organisation's culture and the two things the policy must balance.
list five mechanisms of Antibody to protect us from pathogens and explain how each mechanism work
list five mechanisms of Antibody to protect us from pathogens and explain how each mechanism work
     Please explain what is the business cycle. Explain it, refer to it and clearly cite the...
     Please explain what is the business cycle. Explain it, refer to it and clearly cite the authors covered in class 1. Please define, compare and contrast the meaning of: Expansion, recession, depression, manias, bubbles, boom, bust, and euphoria.      Please explain one factor that can be responsible for a crisis in trade and a crisis in finance/banking. 2. Please pick one country        Please plot/graph the business cycle. Make sure you cover at least the last cycle        Please chose at the following...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT