0% found this document useful (0 votes)
40 views

IS CIE 2 Imp

1) Access control devices are designed to manage and regulate access to data, resources, and organizations in a secure manner. They use authentication methods to identify users and grant appropriate access. 2) Cryptography is used to encrypt data to ensure its confidentiality and integrity during transmission and storage. It uses techniques like hashing and encryption to hide information so only the intended recipient can read it. 3) A security policy outlines an organization's security guidelines and practices for protecting sensitive data from misuse or unauthorized access.

Uploaded by

it.was.spam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views

IS CIE 2 Imp

1) Access control devices are designed to manage and regulate access to data, resources, and organizations in a secure manner. They use authentication methods to identify users and grant appropriate access. 2) Cryptography is used to encrypt data to ensure its confidentiality and integrity during transmission and storage. It uses techniques like hashing and encryption to hide information so only the intended recipient can read it. 3) A security policy outlines an organization's security guidelines and practices for protecting sensitive data from misuse or unauthorized access.

Uploaded by

it.was.spam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Lnforfraton Seouhty cIE2Smp

iteAot acesy Cotoldewíce.


wed to manage and regdat
4) Access covtaldevtces ave des igigued
acces to sesorces,data în ovgnizeh'on
)wñteeotcipler method.
Aapher mhad is sed to enengptand decpt deta by
ensuwing its coniertiality and nteqity din transmissih
oY Storage
Oitass abot Seuity Cestfi'ation.
A) Seuwity Certifcaion is aa preceafomad reogniten that
ndividua posselses the Spe knawledged Syily to pexfem
8ecrita elated taskin an ITenwirorment.
)oefine Gecuity folia
ASeeuity poley is a set a docusmented quidelines le
and pracices estaldish
e 2 a h o n to Saftauad
Kensifive dadtafron
ahdmisuse:
S)osuas obot nyptgaphy
Batographyi the proces of coding er hidingingomations
Ba thad only the peao a mesage inteledfr cou tead it
ochae otack1 on cypiloagteme
A) Ataks on
ornporormise the Becaity of opieqsophic agothns.
K.exe D) aConedoahon ae A) A)
)0hne
Fireusal
)A
iodec l System ) tm)e on A S, 3y 3donans d,They
measure anal Secaihyes
unmaize, Uishe Defne Vanerabüy toite laning Glemal Motounene Maintainene
Summoie Model' Rrotocsls oeoe
ugoes temd Fireusall
are deveyo leg
to
Irtsion about remaln thot -fos otocss and
- identifand
3 proecas hougnotbeyorà Honi and oni
types faties Se odgin3 is
nfomoahon Informnationoauty Aises ton isk
toing efecue model is gouemthe cre toY a
. of Deleon
ot opda prajeat ne
nmetl Asessmentng Secuwre
esond
Man monihing commuuni nhoo oc
ertre
managemet Reme
ananemenb
geman proeas
foY
agaiila aa lommunicions Rewe Seewbir
to proige diatiohy ahong
snautho and hafe
thea drnsmission are
moes anolyng integrain
Herejet eneing basadSytem
modela yele
Hanagumenl let
They
eres,acib da and o rooitos
onthat
achvih Secwihy bes of predelemined
are enßuves proedwrA
doablo
s
oo
Answes
Lorg through ushih Ncan be
agproaches
i9 Define VPN Disauás too
ionplerneled etabahed over
isa le ue,ahd enoypt ed Corn eabion
r: VeN: vPN
infrasteture to prouide 8ewre aaers t prtvete
apudolie ntuoo muni aton hetea
and faiitafe' Beure, Com
remste es and Cohporate etooa PPoaehed are
epoaches to yPN. The 2,ommen
in dividwali and
) Rernote aceyg VPN: B is om vony used b in
Inlenaresourea Beew eyorn rernete locahy
bubineaes to aceas a vPN See hosted be the
Uaes tonnettaeir deuicea to
ergaization yalvia sotore
amployes renetely aceasing
traieles'bonnecnq to Seuse cporale
neooes an &busines
relosces er a patb We coiß
Seto Site liG conneds aso paucde inetseds Seurely
publie irtent as ifhey re direty ated.
or the ao
Ttis used by busines to extend heis 'netiooks
*
lscahons,Seuseyshare daa toith tatnes.
dedicateN hardusare cotoare aplançes at
*keayives a
tach neto end point
&Ongtograplhy io a tehoiate that pooidee toos and
A uhathoied aeies,
tehiques hpote dda tom

tomtinatson of malemahcod alyis


echiere by
gort Secxt eyg

onndetiality: D males doa nreadalde to nyone eced


ata
the interdedrecipent This is ahiened by eneh ptng

rtegth E enase that data hau not beeh tampeed


voth duing transnacioo achiered
.bash guntions to oxeate aa uniae fngex pst
3)Athentanson: T veifesthe identies f patses iwelied
ahautro
in the comonieahon This is nucia for presedng
s and inpaáendion tehmp
aceess

in todays digitl oold ohere


Onptography is easerdhial aacs
data bseacies and cbex constany osoigg
are
opography.
s) plain io Delails Foundaion of inthe piniplea and.
Ans: Fondatio ptography ie
tehnique hat angre coni dentiaity, tea nit and
comptex
authertaty o dta transmjttel and &tored in
lgslems.
These re aee
A) onfdertialyi onßidentaliy erswra that infonmati
alityiConfidentiality
ony aceeasy ble for autyotâzed sesek.
nünb PñNate and
*Unyptograpy adhieves this by enenptog bhic iwowes
Consetinglntext t ciphe tes
d Srteity: Irtegity engres that dlota has not beentapoed
2) and tansmibn.
botth dusing Storage bxed ens
hashiog hic generate
Dtegity is achiesed by
rorn daa
alues or messag eigest
Wesifies the ieentsty of pasties
)Adenity: Adhentioation
moed in commni caan: aecess.
foy pelentng unathoized
*Thisis Ccial
aptograehís alaoithrt m he
oygtogvaphic Hyortma:
enttgraphie operahons.
bais of
algonthnsfminelude, Bmmetieenpton,hah
*These
functiont et
Devices.
49) Disauss aboct Acess Costt deuices are ieet desiqned
Cortrol Deuics: tceLs tontol
fns Aeeas data ,relowrces
to data
aeees to ete
manage and sequdate
ganizatoo.
Deuices ate
the Access Contol
Bome o
9PhyicalAeeess Conthol ystens'. Physical
hooms and eher physio Spates
ragudode erty into buildings Coannos etk.o grut
key ar,RiJosd es, Biometic
aooes baied on nes and emscon.
lojia Acess Conhol tems: These ystems manage ae
rseoue, netooa and appcatrons They entuy;
to digital caen login aa oataa
ealy ahomed uses
ht
pexfom aah ons
Athotiation deuices play a undamenly
3)Athentication Pesice:
heses
l Vefjingthe idenstyo
Tesotes

AahoÏzaon mewhanisms AuShoi aton mechanism dsema


lesel of aess qYarted
,
to utherted ises baedyn
the
ther oles reponsibiüfes and amiesions .
he Seuoy polig
Ans eouoty policy, Seauastpiy iafnal doeuyeat -that
organizon's
butires the hle,peceduses foy proteding an
inrmattoo auds
okjedives poliag:
Detadish odear Brpetaons: Itdefines the aoreptalle and
unacreptabte ese o yesowces, acuers contols Setpracbccs.
wefoe to idehfyand mibgte pstenbd
leunty thres and ulneralbilites
Grure compi lone: Agning cith dauet dtpilaay regwati
)
and Industy Stondaoy
elernet of
)rfmnation dasifcabon: lasijng infmatson bayed en t
Qencit ve tesel and defining appphate roe hon eakerei
for eaah aategs
Acess Contol: ptenininguoho has access to coha infatbn
2)
and Bystems:
pata Prolech'on: Zpeafing rocedukes for deta un hypton,
ghorege, trans mision Ond dipoSad:
in delail rsleding conne 'on.
Renm sle,
6) Desonbe
vermote copne dhon is ruial in toas eniboomet
Ant: Prsledin3 onpote netoos ,anol eoukcel,
cohere enmpayees acess to co
Protet kemoe Connehoo
Pradies to

Temole uses to aoeess the orgenih


ouct the inlemet alosing
netucok seauyey
Aithentoaon (NFA): MF4 adols an exta layer
Nultkctoy
lsem to poýde muthple foms ot
Secuity byeqyiving fdentity
audhent cation to ven heir aceeAs'ng the
rrle deulces
) Gndpor ecusity Snsye that debe Seunty sote
organizhions netso have upto
andWonitoing Jonpenmest obousf moni%oong and
logging Qotisites
mecthan's trace emste acoess d t
datt
ogging eojth velarent
Gnsse remote acces comply
9 ompilarces &tndard
reydatore ard înduty
Prnaoy
and expdain diferentspography
a0ut neie Rgovithms yoitna in delaid
Are:
Aduanted Ghehpleon tondord (Aesy Tticis a oidely aed
Sanueliie algonhm hat Ssgposte kg length 8, 2,216 bit.
Daa fnephion Standord eDes): is andder Symmdie
algorthon tht
that operote
opeyotes on 6u-bt blacks and

Asgmebie Gngtion Agetoos


Rivest-&hami - AdalmansA): tis mast sldely yed
Qssmetic alonthona shich selias on mhematealpee
generaon
lage pime numbes tor Geate bey
DaitlCigrature gorthn: Thcxagoi-tams are used far
grerntngand aitgirg digital aignata
Hach Funhions

Cyptgraphe haul fndonsinputh Heah nctions qeneyatefred


tena hal, funcbona fom data uhich are csed r
paiseo hashing:
data irput integity and pasescrd
uoiddy sed gptoagrfhicogothn
alue
thot duees 18 bit hah

1doerence btiween drtrion Deteaion and roventa


Byetern:
hns Trtuion Dàedhon Intmston Prerentan
Syste ystem
SNonitos neusor for BiqnsMonitos netoort and prevot

DPetets and alet adiishato 2 Acbuey blaks


abot nauhoired achv and
tge
seeustthyat
preventthem Teaching Hheir
Tatyion QtecionSstem Sirthuson frevetin ysten
) Passive esgorse by getiAetive response by
aeneaig alet to odnin.aeiou thaffé nmeal tme:;!

neticosk traie neboar trafhe: \cent fo the

) t is,nere, Soalable
)Ttis less comple to dplag Ais 'moresemp complexte,
and manage deplay and mahage

ng)Gplain aboat Non-Tenic aipe af Toaplemendahon


Ans: Some tthe nen-technical ayests are

)Folicesond Proealaares: Etslahing ornpehenaive Secaity polias


aud proedxes is fuhdamental to Hinfmation Seaity.
Rise Managenent: Jimglerverdng fere isk managepnetluo lies
Betäying iotizing aseAsing isks to rganizahan injemaion
assct jrastche ond operattons
) Beauity oareness and Treining : Ehucating the empayees abogt
best Praees is asentiafs
Seaushty hreat Vunerabities qnd
wtthin the orgonl>tor
Managing -the Seauy sls ascoclotel
9iastRisk Nanagemert? jdes is bon-teohical
totnendos andhird paty en levuices pou
23) Discus about Seeeiy aintainene mrzi model.
shucel
Nais, model is a Shuced,
Ans: SeusÙty Maintainere model: lhis
oRrach to mairtain the Seaunty posthe e an cogni adion's
Bystems nd daa overtme
,

Congonent e Secanty Model:


DRateh Manageert: inwowes idenitig phoitang and
patches and updata to addlies setuity
agping Sotoare
Naneredoiities in opetatng Systen
» Valnenbily ManajementiVlheaki lity monaqement inisWes
Seeusity iualnerabilitu aau
ldcnting esselsýng andpoihziog opicatons:
ad
the oganizatioosinfrastnche
onfiquason Managemotitonfawation managemert ipwabie
Seeuuke eontiwrahon boelines hor
estabtishing and entvcing
Bystems desices ahthauning proab
Aoaseness: Seeit asareneit
emboea abot he seas nisty
abse eisenhal fs educang'
Psacteesi
threts and best and Forensis
Reaponse and Forensea: Inidentes ponse
s)Tneident
data breahe
BeisDty inidets ond

You might also like