Security Mechanism

Security Mechanism

⟶ It is a tools, technique or method used for protection of data, computer system and network from unauthorized access, misuse or damage.



1. Identity and Access control
⟶ Process that limit the access to computer system or resources
⟶ Provides control over user validation and resource access
⟶ Verifies the user identity and their level of access in a particular system
⟶ Ensure that the data is access only by right person

    a. Authentication
    ⤷ Process to verify the user identity
    ⤷ First step to verify the user
    ⤷ Verifies who the user is
    ⤷ Method of authentications are Password, PIN, OTP, biometric scan, security question, MFA, pattern, etc.

    b. Authorization
    ⤷ Process that determine the level of user to access in computer    system and resources
    ⤷ Use to give permission to access some data or perform particular action.
    ⤷ Methods of authorizations are Role based Access control, Mandatory Access control, Access control list, access to data, etc.

2. Firewall
⟶ Network security device or program which monitors and control the incoming and outgoing data in computer network with predefined rule.
⟶Function of firewall
    a. Monitor and control data flow in computer network
    b. Checks the incoming data in network as security post
    c. Filters, limits or rejects the incoming data from other network.
    d. Keeps record or log of user activities in computer network
    e. Prevents information leakage and modification of data
    f. Work as barrier between LAN and internet

3. IDS
⟶ Stands for Intrusion Detection System
⟶ It is a device or software application used for monitoring computer network for malicious activities, security violation and threat then generate alert.
⟶ IDS can detect problem with:
    a. Pattern: The technology that flag unusual request
    b. Prior attack: The technology that flag anything on the server that has been used in known and successful attacks on another server
    c. Machine learning: The system pick up information about everything that happens on server in an average day

4. IPS
⟶ Stands for Intrusion Protection System
⟶ It is the process of stopping security threats and incidents in computer network detected by Intrusion Detection System
⟶ Action of IPS
    a. Closes session: It include termination of TCP session, blocking an IP address
    b. Strengthening firewall: Updates capacity of firewall by making necessary changes
    c. Cleanup: Scan for damaged or malicious content and remove them

5. Email Filtering
⟶ The process of analyzing incoming emails which filters and separate emails into different folders based on specified criteria
⟶ Helps to manage email in efficient way
⟶ Helps to identify spam, phishing message
⟶ Email filtering techniques
    a. Reputation based email filters
    ⟶ Filter email based on Reputation Block List (RBL)
    b. Safe listing
    ⟶ Adding to trusted list by organization
    c. Black listing
    ⟶ Adding organization to blacklist that block email
    d. Grey listing
    ⟶ Temporarily rejects the incoming email
    e. Antivirus
    ⟶ Used to scan email attachment for malware
    f. Content analysis
    ⟶ Ability to block the email based on its content

6. Antivirus software
⟶ Software that is used to scan, detect and remove or delete malicious code or program from computers




Post a Comment

0 Comments