0% found this document useful (0 votes)
93 views6 pages

Network Security

Computer security principles include confidentiality, authentication, integrity, non-repudiation, access control, and availability. Confidentiality ensures only the intended recipient can access messages. Authentication establishes proof of identity. Integrity protects against data alteration. Non-repudiation prevents sender or receiver denial of transmitted messages. Access control limits system access through communication links. Availability means authorized entities can access resources at all times.

Uploaded by

1harshika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
93 views6 pages

Network Security

Computer security principles include confidentiality, authentication, integrity, non-repudiation, access control, and availability. Confidentiality ensures only the intended recipient can access messages. Authentication establishes proof of identity. Integrity protects against data alteration. Non-repudiation prevents sender or receiver denial of transmitted messages. Access control limits system access through communication links. Availability means authorized entities can access resources at all times.

Uploaded by

1harshika
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Computer Security

1|Page
2|Page
3|Page
4|Page
SECURITY TERMINOLOGIES AND PRINCIPLES
The different security principles and there terminology are as below :
1. Confidentiality :- The confidentiality principle means that only the sender and the
intended recipient should be able to access the message. Confidentiality is not achieved if
an unauthorized person is able to access a message.
2. Authentication :- The authentication principle help to establish proof of identities. The
authentication process makes sure sure that the sender of a electronic message or
document is correctly identified.
3. integrity:- The integrity principle protects data against active threats like those that
may alter it.

5|Page
4. Non-repudation:- The principle of non-repudation prevents either sender or receiver
from denying a transmitted message. Therefore, whenever a message is send by the
sender, the receiver can prove that the message was sent by that the sender. When a
message is received, the sender can prove that the message was received by the receiver.
5. Access control:- The principle of access control means the ability to limit and control
the access to host systems and applications through communication links. To achieve this, a
user attempting to access must first be identified, or authenticated.
6. Availability:- The principle of availability means that system resources must be
available to authorized entities at all times.

6|Page

You might also like