![computer network security in hindi pdf computer network security in hindi pdf](https://www.researchgate.net/profile/Mudassir-Khan-3/publication/321017052/figure/fig1/AS:559802037346304@1510478614481/Model-of-Network-Security-Why-do-we-Need-a-Network-Security-Model_Q320.jpg)
- #Computer network security in hindi pdf registration
- #Computer network security in hindi pdf password
Authorization Service Authentication Mechanism Authorization Mechanism Client Authentication simply identifies a party, authorization defines whether they can perform certain action RFC 3552ġ9 Authorization Concepts Authorization creep When users may possess unnecessarily high access privileges within an organization Default to Zero Start with zero access and build on top of that Need to Know Principle Least privilege give access only to information that the user absolutely need Access Control Lists List of users allowed to perform particular access to an object (read, write, execute, modify)Ģ0 Single Sign On Property of access control where a user logs in only once and gains access to all authorized resources within a system.
![computer network security in hindi pdf computer network security in hindi pdf](https://i1.rgstatic.net/publication/354734263_Analysing_Informal_Relations_and_Networks_in_Security_Force_Assistance_The_Case_of_Niger/links/614a2d64a3df59440ba13872/largepreview.png)
#Computer network security in hindi pdf password
It provides 3 essential services: Authentication (who can login) Authorization (what authorized users can do) Accountability (identifies what a user did)ġ2 Authentication A means to verify or prove a user s identity The term user may refer to: Person Application or process Machine or device Identification comes before authentication Provide username to establish user s identity To prove identity, a user must present either of the following: What you know (passwords, passphrase, PIN) What you have (token, smart cards, passcodes, RFID) Who you are (biometrics such as fingerprints and iris scan, signature or voice)ġ3 Examples of Tokens etoken RFID cards Smart Cards Fingerprint scannerġ4 Trusted Network Standard defensive-oriented technologies Firewall Intrusion Detection Build TRUST on top of the TCP/IP infrastructure Strong authentication Public Key Infrastructure (PKI)ġ5 Strong Authentication An absolute requirement Two-factor authentication Passwords (something you know) Tokens (something you have) Examples: Passwords Tokens Tickets Restricted access PINs Biometrics Certificatesġ6 Two-factor Authentication Requires a user to provide at least two authentication factors to prove his identity something you know Username/userID and password something you have Token using a one-time password (OTP) The OTP is generated using a small electronic device in physical possession of the user Different OTP generated each time and expires after some time An alternative way is through applications installed on your mobile device Multi-factor authentication is also commonġ7 Authorization Defines the user s rights and permissions on a system Typically done after user has been authenticated Grants a user access to a particular resource and what actions he is permitted to perform on that resource Access criteria based on the level of trust: Roles Groups Location Time Transaction typeġ8 Authentication vs. Vulnerability Threats and Attack Typesĥ Why Security? The Internet was initially designed for connectivity Trust assumed We do more with the Internet nowadays Security protocols are added on top of the TCP/IP Fundamental aspects of information must be protected Confidential data Employee information Business models Protect identity and resources We can t keep ourselves isolated from the Internet Most business communications are done online We provide online services We get services from third-party organizations onlineĦ Internet Evolution LAN connectivity Application-specific More online content Cloud computing Application/data hosted in the cloud environment Different ways to handle security as the Internet evolvesħ Why Security? Key findings: Hacktivism and vandalism are the common DDoS attack motivation High-bandwidth DDoS attacks are the new normal First-ever IPv6 DDoS attacks are reported Trust issues across geographic boundaries Source: Arbor Networks Worldwide Infrastructure Security Report Volume VIIĨ Breach Sources Aggregation Infiltration Exfiltration Source: Trustwave 2012 Global Security Reportĩ Types of Security Computer Security generic name for the collection of tools designed to protect data and to thwart hackers Network Security measures to protect data during their transmission Internet Security measures to protect data during their transmission over a collection of interconnected networksġ0 Goals of Information Security Confidentiality Integrity Availability prevents unauthorized use or disclosure of information safeguards the accuracy and completeness of information authorized users have reliable and timely access to information SECURITYġ1 Access Control The ability to permit or deny the use of an object by a subject.
![computer network security in hindi pdf computer network security in hindi pdf](https://techwafer.com/wp-content/uploads/2018/11/Hacking-Book-PDF.jpg)
#Computer network security in hindi pdf registration
1 Network Security Tutorial Contact: TSEC01_v1.0Ģ Overview Network Security Fundamentals Security on Different Layers and Attack Mitigation Cryptography and PKI Resource Registration (Whois Database) Virtual Private Networks and IPsecģ Network Security Fundamentals Network Security WorkshopĤ Overview Why We Need Security Definitions and Concepts Access Control Risk vs.