wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in

Siddhesh

user banner image
profile
Siddhesh @siddhesh

ResumeBlogsQuestions
Sign in

Top Users

profile

Nisma

@nisma
profile

hira zore

@hirazore
profile

Rashi Pawar

@rashipawar

Featured Blogs

Disk Management

Blog banner

Android Flashlight Application

Blog banner

Consumer to consumer business mode

Blog banner

Burning Questions

State and explain characterstics of virtual circuit network.

What are some unique traditions that you know about

What are two forms of graphic processing unit??

Contact Us

|

About Us

|

Points nomenclature

|

Terms of service

|

Privacy Policy

|

Cookie Policy
profile

Siddhesh

@siddheshDec 20, 2017

Explain the challenges involved in establishing computer security

Explain in detail

2 Discussions
452 Reads
profile

Siddhesh

@siddheshDec 20, 2017

Write a note on Fail-stop signatures

In Short

4 Discussions
468 Reads
profile

Siddhesh

@siddheshDec 20, 2017

What is key predistribution? Explain the concept

Answer in detail

3 Discussions
409 Reads
profile

Siddhesh

@siddheshDec 18, 2017

What is the various security attacks identified under the OSI security architecture?

How would you explain

3 Discussions
398 Reads
profile

Siddhesh

@siddheshDec 18, 2017

Describe the various security services?

Security service is a service which ensures adequate security of the systems or of data transfers. The classification of security services are as follows:- • Data confidentiality Authentication • Access control  • Data integrity • Nonrepudiation • Availability service: Confidentiality: Ensures that the information in a computer system and transmitted information are accessible only for reading by authorized parties. The principle of confidentiality specifies that only the sender and the intended recipient(s) should be able to access the contents of a message. Confidentiality gets compromised if an unauthorized person is able to access a message. Eg., printing, displaying and other forms of disclosure.  Authentication: Ensures that the origin of a message or electronic document is correctly identified, with an assurance that the identity is not false. • The recipient of the message should be sure that the message came from the source that it claims to be • All communicating parties should be sure that the connection is not interfered with by unauthorized party. Integrity: Ensures that only authorized parties are able to modify computer system assets and transmitted information. Modification includes writing, changing status, deleting, creating and delaying or replaying of transmitted messages. Protection from active attacks  It may be integrity with recovery, or  Integrity without recovery (detection only) Non repudiation: Requires that neither the sender nor the receiver of a message be able to deny the transmission. Protection against denial by one of the entities involved in a communication of having participated in the communication. Access control: Requires that access to information resources may be controlled by or the target system. This service controls  who can have access to a resource;  under what conditions access can occur;  what those accessing are allowing to do. Example: in online banking a user may be allowed to see his balance, but not allowed to make any transactions for some of his accounts Availability: Requires that computer system assets be available to authorized parties when needed.

3 Discussions
399 Reads