Security in Computing - Tutorial 02 - Week 02
Security in Computing - Tutorial 02 - Week 02
Question 01. Simply write down the three critical components, which must be there to maintain the
information security of assets in an enterprise.
Ans: The three critical components which maintain the information security of assets in an
enterprise are:
Confidentiality
Confidentiality means giving access only to the authorized user. It does not allow the
unauthorized access and prevent the information from the destroy and attack.
Confidentiality helps to protect the confidentiality of information and provide security
to the organization. Confidentiality allows only to the authorized access. It is
important to implement information security measures. It helps to set the
fundamental goals for an organization. It protects the information from unauthorized
access. Example: confidentiality is maintained for a biometric if authorized students
are able to attendance it, while unauthorized students are blocked from attendance.
So, the confidentiality helps to control access and protect from unknown students.
Integrity
Integrity means data or information which has been used cannot be change or
modify. It transfers the data without change. Integrity of information helps to exposed
damage, destruction and corruption. When attacker separates or breaks data into
corporate database and delete such data then it is termed as attack against integrity.
Example Unauthorized access and use makes possible to change information. So,
integrity it is used to monitor and control transmission of information and authorized
access.
Availability
• Confidentiality
Confidentiality means giving access only to the authorized user. It does not allow
the unauthorized access and prevent the information from the destroy and attack.
Confidentiality helps to protect the confidentiality of information and provide
security to the organization. Confidentiality allows only to the authorized access.
It is important to implement information security measures. It helps to set the
fundamental goals for an organization. It protects the information from
unauthorized access. Example: confidentiality is maintained for a biometric if
authorized students are able to attendance it, while unauthorized students are
blocked from attendance. So, the confidentiality helps to control access and
protect from unknown students.
• Integrity
Integrity means data or information which has been used cannot be change or
modify. It transfers the data without change. Integrity of information helps to
exposed damage, destruction and corruption. When attacker separates or breaks
data into corporate database and delete such data then it is termed as attack
against integrity. Example Unauthorized access and use makes possible to
change information. So, integrity it is used to monitor and control transmission of
information and authorized access.
• Availability
vii. Authentication, Authorizations are key factor for access control in securing a
confidential data.
Question 04. In your own words, describe the following access control mechanisms:
• Identification
Identification means recognize of individual users and provide access to an
individual. If system could not identify him/her then it won’t provide access. It is
one of the most important process of giving proof about the user.
• Authentication
Authentication means providing proof of his or her identification and access the
system. It is all about the verification of individual when he/she claim to be. If
system does not verify an individual, it involves the identification process. This
process prevents the system from the authorized access.
• Authorization
Authorization means up to how much user could access the system and update,
delete or change the contents of the information asset. It is the next process of
determination. It allows user after access to use, modify or change some types of
assets or resource.
• Accountability
Ans: The two protocols which can be used to implement AAA services within an
enterprise’s computer network infrastructure are:
RADIUS
TACCAS+
Best of Luck