Module Code & Module Title CC5004NI Security in Computing
Module Code & Module Title CC5004NI Security in Computing
I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a marks of zero will be awarded.
Security in Computing CC5004NI
Question number 1
Simply write down the three critical components, which must be there to maintain the
information security of assets in an enterprise.
Answer:
The main components that should be maintained for the accomplishment of
information security of assets in an enterprise are:
Confidentiality
Integrity
Accessibility
ROJIN BIMB 1
Security in Computing CC5004NI
Question number 2
Write short notes on (do provide relevant examples):
Confidentiality
Integrity
Availability
Answer:
Confidentiality
Confidentiality makes sure that only authorized personnel are given access or
permission to modify data.
For example, The two-factor authentication (debit card with the PIN code)
provides confidentiality before authorizing access to sensitive data
Integrity
Integrity helps maintain the trustworthiness of data by having it in the correct state and
immune to any improper modifications.
For example, The ATM and bank software ensure data integrity by maintaining all
transfer and withdrawal records made via the ATM in the user’s bank accounting.
Availability
Availability means that the authorized users should be able to access data whenever
required.
For example, The ATM provides availability as it is for public use and is accessible at
all times.
ROJIN BIMB 2
Security in Computing CC5004NI
Question number 3
Describe the role of access control in securing a confidential data within an
organization.
Answer:
Access control is a method of guaranteeing that users are who they say they are and
that they have the appropriate access to company data.
ROJIN BIMB 3
Security in Computing CC5004NI
Question number 4
In your own words, describe the following access control mechanisms:
Identification
Authentication
Authorization
Accountability
Answer:
Identification
Identification refers to who you are, your name, username, ID number etc
Accountability (Auditing)
Being able to trace an action back to an individual.
Prove what someone did, and when they did it. Known as non-repudiation
Now consider a case that demonstrates each IAAA component. When most of us think
of a typical login page, which is how we access systems, we typically see two fields:
username and password. Your username serves as your unique identifier; without it, the
system cannot provide us access because it would not recognize us. We identify
ourselves to the system by entering a username.
After identifying oneself, we must authenticate and demonstrate our identity. The
password box is here. The system requires you to confirm your username before you
ROJIN BIMB 4
Security in Computing CC5004NI
can access it; additional ways for authentication include fingerprints, pins, and iris
scans.
After successfully logging in, you can view, change, and delete data according to the
permissions granted to you. RBAC and other access control methods can be used in
this situation. You have now been granted user authorization after supplying and
validating your identity.
ROJIN BIMB 5
Security in Computing CC5004NI
Question number 5
Elaborate the two protocols which can be used to implement AAA services within an
enterprise’s computer network infrastructure.
Answer:
The two protocols that can be used to implement AAA services within an enterprises’s
computer network infrastructure are as follows:
Two popular security protocols that are used to give centralized access into networks
are Remote Access Dial In User Service (RADIUS) and Terminal Access Controller
Access-Control System Plus (TACACS+). TACACS+ is most frequently used for
administrator access to network devices like routers and switches, whereas RADIUS
was created to authenticate and log distant network users. For computers that connect
to and use a network service, both protocols enable centralized authentication,
authorization, and accounting (AAA) administration.
ROJIN BIMB 6