0% found this document useful (0 votes)
10 views7 pages

1

Uploaded by

Yash gawas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views7 pages

1

Uploaded by

Yash gawas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

1.AUTHENTICATION&AUTHORIZATION?

=Authentication is the process of recognizing a user’s identity.

It is the mechanism of associating an incoming request with a set of identifying credentials.

The credentials provided are compared to those on a file in a database of the authorized user’s

information on a local operating system or within an authentication server.

The authentication process always runs at the start of the application, before the permission and

throttling checks occur, and before any other code is allowed to proceed.

Different systems may require different types of credentials to ascertain a user’s identity. The
credential

often takes the form of a password, which is a secret and known only to the individual and the
system.

Three categories in which someone may be authenticated are: something the user knows,
something

the user is, and something the user has.

Authentication process can be described in two distinct phases - identification and actual
authentication.

Identification phase provides a user identity to the security system.

This identity is provided in the form of a user ID. The security system will search all the abstract
objects

that it knows and find the specific one of which the actual user is currently applying.

Once this is done, the user has been identified. The fact that the user claims does not necessarily
mean

that this is true.

An actual user can be mapped to other abstract user object in the system, and therefore be granted

rights and permissions to the user and user must give evidence to prove his identity to the system.

The process of determining claimed user identity by checking user-provided evidence is called

authentication and the evidence which is provided by the user during process of authentication is
called

a credential.

AUTHENTICATION-

Authorization is a security mechanism to determine access levels or user/client privileges related to

system resources including files, services, computer programs, data and application features.
This is the process of granting or denying access to a network resource which allows the user access
to

various resources based on the user's identity.

Most web security systems are based on a two-step process.

The first step is authentication, which ensures about the user identity and the second stage is

authorization, which allows the user to access the various resources based on the user's identity.

Modern operating systems depend on effectively designed authorization processes to facilitate

application deployment and management.

Key factors contain user type, number and credentials, requiring verification and related actions and

roles.

Access control in computer systems and networks relies on access policies and it is divided into two

phases:

1) Policy definition phase where access is authorized.

2) Policy enforcement phase where access requests are permitted or not permitted.

Thus authorization is the function of the policy definition phase which precedes the policy
enforcement

phase where access requests are permitted or not permitted based on the previously defined

authorizations.

Access control also uses authentication to check the identity of consumers. When a consumer
attempts

to access a resource, the access control process investigates that the consumer has been authorized
to

use that resource.

Authorization services are implemented by the Security Server which can control access at the level
of

individual files or programs.

2.DATABASE SECURITY LAYERS?

= Database security refers to the range of tools, controls, and measures designed to establish
and preserve database confidentiality, integrity, and availability. This article will focus
primarily on confidentiality since it’s the element that’s compromised in most data breaches.

There are three layers of database security: the database level, the access level,
and the perimeter level. Security at the database level occurs within the database
itself, where the data live. Access layer security focuses on controlling who can
access certain data or systems containing it. Security policy at the perimeter level
determines who can and cannot get into databases. Each level requires unique
security solutions.

Security Level Database Security Solutions

Database Level  Masking


 Tokenization
 Encryption

Access Level  Access Control Lists


 Permissions

Perimeter Level  Firewalls


 Virtual Private Networks

3.SYMMETRIC & ASSYMETRIC KEY CRYPTOGRAPHY?

=Symmetric Key Encryption: Encryption is a process to change the form of


any message in order to protect it from reading by anyone. In Symmetric-key
encryption the message is encrypted by using a key and the same key is
used to decrypt the message which makes it easy to use but less secure. It
also requires a safe method to transfer the key from one party to another.
Asymmetric Key Encryption: Asymmetric Key Encryption is based on
public and private key encryption techniques. It uses two different key to
encrypt and decrypt the message. It is more secure than the symmetric key
encryption technique but is much slower.
Symmetric Key Encryption Asymmetric Key Encryption

It requires two keys, a public key and a


It only requires a single key for both private key, one to encrypt and the other
encryption and decryption. one to decrypt.

The size of cipher text is the same or The size of cipher text is the same or
smaller than the original plain text. larger than the original plain text.

The encryption process is very fast. The encryption process is slow.

It is used when a large amount of data is It is used to transfer small amounts of


required to transfer. data.
Symmetric Key Encryption Asymmetric Key Encryption

It provides confidentiality, authenticity,


It only provides confidentiality. and non-repudiation.

The length of key used is 128 or 256 bits The length of key used is 2048 or higher

In symmetric key encryption, resource


utilization is low as compared to In asymmetric key encryption, resource
asymmetric key encryption. utilization is high.

It is efficient as it is used for handling It is comparatively less efficient as it can


large amount of data. handle a small amount of data.

It is more secure as two keys are used


Security is less as only one key is used for here- one for encryption and the other
both encryption and decryption purpose. for decryption.

5.PUBLIC KEY & PRIVATE KEY?

Private Key Public Key

Slower than the


Speed Faster than the public key
private key

One of the two keys


Secrecy Key is kept secret
is secret

Symmetry Symmetrical because it Asymmetrical


features only one key because it uses two
keys, one public and
one private

Not as efficient as the


Efficiency Very efficient
private key

Best used with large Ideal for short


Capacity
amounts of text messages

There’s a possibility of Key loss isn’t likely


Key Loss losing the key, thereby since it’s held
rendering the system void publicly.

Although the private


key component is
Privacy This key is private private, the public
key part can be kept
open to the public

The sender and the The sender and the


Sender/Receiver Dynamic receiver employ the exact receiver don’t have to
same key share the same key

The same secret key and Two keys are


Key Function
algorithm as used to both employed, one for
encrypt and decrypt the encryption and the
message other for decryption

6.RISK REMEDIATION?

=Cyber risk remediation is the process of identifying and addressing cyber


threats that can impact your business and network security. The key to
effective cyber risk remediation is having continuous visibility into your
internal and third-party network infrastructures. This allows you to quickly
identify new threats so that they can be addressed before they are
exploited. Failing to detect network gaps significantly lowers your chances
of eliminating them so the quicker they are discovered, the better.

Without threat remediation, you are essentially leaving your network open
to threat actors. This makes it difficult to identify a breach until after it has
occurred. Failure to detect and contain a breach can have a significant
financial impact on a business as the penalties for non-compliance with
data regulations are often substantial. This can also seriously impact an
organization’s reputation because, after a breach, it can be extremely
difficult to regain customer trust.

7.DATABASE SECURITY GENERAL CONCEPT ?


= REFER SOME POINTS FROM ANS 2

Why is it important

By definition, a data breach is a failure to maintain the

confidentiality of data in a database. How much harm a

data breach inflicts on your enterprise depends on a

number of consequences or factors:

Compromised intellectual property: Your intellectual

property—trade secrets, inventions, proprietary

practices—may be critical to your ability to maintain a

competitive advantage in your market. If that intellectual

property is stolen or exposed, your competitive advantage

may be difficult or impossible to maintain or recover.

Damage to brand reputation: Customers or partners

may be unwilling to buy your products or services (or do

business with your company) if they don’t feel they can


trust you to protect your data or theirs.

Business continuity (or lack thereof): Some business

cannot continue to operate until a breach is resolved.

Costs of repairing breaches and notifying

customers: In addition to the cost of communicating a

breach to customer, a breached organization must pay for

forensic and investigative activities, crisis management,

triage, repair of the affected systems, and more.

You might also like