Unit-11 Computer Security
Unit-11 Computer Security
Authentication, Intrusion Detection Systems); • Firewall—Functions of firewall, working principle, types of firewall (packet filter firewall, circuit filter
firewall, proxy or application-level firewall)
Security Awareness; Security Policy • Users identification and authentication—User name and password, smart card, biometrics
• Other security measures—Intrusion detection systems, virus protection software, data and
information backups, SSL, IPsec protocol
Security awareness, security policy (formulating a security policy)
Once the user is authenticated, the access controls for the user are also defined. Access 3. data and information backups,
controls is what the user can access once he is authenticated. 4. SSL,
5. IPsec protocol
policy must be comprehensive, up-to-date, complete, delivered effectively, The security policy also includes physical security of the computers. Some
and available to all staff. A security policy must also be enforceable. To of the measures taken to ensure the physical security of a computer are -
accomplish this, the security policy can mention that strict action will be taking regular backups to prevent data loss from natural calamity, virus
taken against employees who violate it, like disclosing a password. attack or theft, securing the backup media, keeping valuable hardware
resources in locked room (like servers), to avoid theft of systems and
storage media.