Sunday, December 29, 2019

A Brief Note On Professional Seminar Network Security

FA 15 - CS699D - PROFESSIONAL SEMINAR Network Security Abstract Network Security The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individuals, businesses, and governments risk losing that asset. Network security is the process by which digital information assets are protected. The†¦show more content†¦Specialty areas within an industry often have their own brands of jargon, as well, and the computer security sub-field is no exception. It is not possible to provide a complete glossary of security-related terms within the scope of this chapter, but in this section, we will define some of the more common words and phrases that you may encounter as you begin to explore the fascinating world of computer security: ââ€"   Attack: In the context of computer/network security, an attack is an attempt to access resources on a computer or a network without authorization, or to bypass security measures that are in place. ââ€"   Audit: To track security-related events, such as logging onto the system or network, accessing objects, or exercising user/group rights or privileges. ââ€"   Availability of data: Reliable and timely access to data. ââ€"   Breach: Successfully defeating security measures to gain access to data or resources without authorization, or to make data or resources available to unauthorized persons, or to delete or alter computer fi les. ââ€"   Brute force attack: Attempt to â€Å"crack† passwords by sequentially trying all possible combinations of characters until the right combination works to allow access. ââ€"   Buffer: A holding area for data. ââ€"   Buffer overflow: A way to crash a system by putting more data into a buffer than the buffer is able to hold. ââ€"   CIA triad: Confidentiality, Integrity, and Availability of data. Ensuring the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.