0% found this document useful (0 votes)
57 views7 pages

Module Code & Module Title CC5004NI Security in Computing

The document is a student assignment submission for a security in computing module. It includes: - The student's details and assignment submission details such as the module code, date submitted, etc. - Five questions from a tutorial on security in computing fundamentals. The student provides answers to each question explaining concepts like the three components of information security, access control mechanisms, and protocols for implementing AAA services. - The student correctly identifies the main components of information security as confidentiality, integrity and availability and provides examples for each. - Access control mechanisms of identification, authentication, authorization and accountability are also defined with a practical example using a login system. - RADIUS and TACACS+ protocols are

Uploaded by

Rojin Bimb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views7 pages

Module Code & Module Title CC5004NI Security in Computing

The document is a student assignment submission for a security in computing module. It includes: - The student's details and assignment submission details such as the module code, date submitted, etc. - Five questions from a tutorial on security in computing fundamentals. The student provides answers to each question explaining concepts like the three components of information security, access control mechanisms, and protocols for implementing AAA services. - The student correctly identifies the main components of information security as confidentiality, integrity and availability and provides examples for each. - Access control mechanisms of identification, authentication, authorization and accountability are also defined with a practical example using a login system. - RADIUS and TACACS+ protocols are

Uploaded by

Rojin Bimb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Module Code & Module Title

CC5004NI Security in Computing

Assessment Weightage & Type


10% Weekly Assignment

Year and Semester


2022-23 Autumn

Student Name: Rojin Bimb


Group: L2N6
London Met ID: 22015860
College ID: NP01NT4S220059
Assignment Due Date: 1st November 2022
Assignment Submission Date: 4th November 2022

I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline in order for my assignment to be accepted and marked. I am
fully aware that late submissions will be treated as non-submission and a marks of zero will be awarded.
Security in Computing CC5004NI

Tutorial 02 – Security in Computing “Introduction”

Question number 1
Simply write down the three critical components, which must be there to maintain the
information security of assets in an enterprise.
Answer:
The main components that should be maintained for the accomplishment of
information security of assets in an enterprise are:
 Confidentiality
 Integrity
 Accessibility

ROJIN BIMB 1
Security in Computing CC5004NI

Question number 2
Write short notes on (do provide relevant examples):
 Confidentiality
 Integrity
 Availability
Answer:
Confidentiality
Confidentiality makes sure that only authorized personnel are given access or
permission to modify data.
For example, The two-factor authentication (debit card with the PIN code)
provides confidentiality before authorizing access to sensitive data

Integrity
Integrity helps maintain the trustworthiness of data by having it in the correct state and
immune to any improper modifications.
For example, The ATM and bank software ensure data integrity by maintaining all
transfer and withdrawal records made via the ATM in the user’s bank accounting.

Availability
Availability means that the authorized users should be able to access data whenever
required.
For example, The ATM provides availability as it is for public use and is accessible at
all times.

ROJIN BIMB 2
Security in Computing CC5004NI

Question number 3
Describe the role of access control in securing a confidential data within an
organization.
Answer:
Access control is a method of guaranteeing that users are who they say they are and
that they have the appropriate access to company data.

At a high level, access control is a selective restriction of access to data. It consists


of two main components: authentication and authorization

Access to information and information processing systems is restricted by access


restrictions. When properly implemented, they reduce the possibility that information
may be accessed illegally, without the proper authorization, or in a way that
compromises data security. They should be followed when accessing information in any
format, on any device, everywhere access is necessary to conduct business.

Information silos are frequently created in practice as a result of excessive access


restrictions. While it is evident that a focus on security and privacy is necessary to
safeguard corporate information and fulfill legal duties for data protection, there also
needs to be a balance with accessibility. According to our experience, sharing
information assets fosters innovation and teamwork and helps eDRMS projects
succeed.

ROJIN BIMB 3
Security in Computing CC5004NI

Question number 4
In your own words, describe the following access control mechanisms:
 Identification
 Authentication
 Authorization
 Accountability
Answer:
Identification
Identification refers to who you are, your name, username, ID number etc

Authentication (Prove who you are)


 Something you know, such as a password
 Something you have, such as a token
 Something you are, such as a fingerprint
 Somewhere you are, such as your IP address
 Something you can do, such as a signature
Authorization (What are you allowed to access?)
Different access models can be used, such as DAC, MAC

Accountability (Auditing)
 Being able to trace an action back to an individual.
 Prove what someone did, and when they did it. Known as non-repudiation

Now consider a case that demonstrates each IAAA component. When most of us think
of a typical login page, which is how we access systems, we typically see two fields:
username and password. Your username serves as your unique identifier; without it, the
system cannot provide us access because it would not recognize us. We identify
ourselves to the system by entering a username.

After identifying oneself, we must authenticate and demonstrate our identity. The
password box is here. The system requires you to confirm your username before you

ROJIN BIMB 4
Security in Computing CC5004NI

can access it; additional ways for authentication include fingerprints, pins, and iris
scans.

After successfully logging in, you can view, change, and delete data according to the
permissions granted to you. RBAC and other access control methods can be used in
this situation. You have now been granted user authorization after supplying and
validating your identity.

To guarantee that accountability is taken into consideration, all systems should


implement some sort of logging or auditing. Auditing will be able to demonstrate that we
have only just logged in to the system and will provide activity information on the actions
we have taken while logged in. Making people responsible for their acts and ensuring
non-repudiation are both aided by this.

ROJIN BIMB 5
Security in Computing CC5004NI

Question number 5
Elaborate the two protocols which can be used to implement AAA services within an
enterprise’s computer network infrastructure.
Answer:
The two protocols that can be used to implement AAA services within an enterprises’s
computer network infrastructure are as follows:

Two popular security protocols that are used to give centralized access into networks
are Remote Access Dial In User Service (RADIUS) and Terminal Access Controller
Access-Control System Plus (TACACS+). TACACS+ is most frequently used for
administrator access to network devices like routers and switches, whereas RADIUS
was created to authenticate and log distant network users. For computers that connect
to and use a network service, both protocols enable centralized authentication,
authorization, and accounting (AAA) administration.

ROJIN BIMB 6

You might also like