UNIT 5tk
UNIT 5tk
UNIT 5tk
These challenges highlight the need for robust data security measures that guard
against insider threats and human error, which continue to be among the primary
causes of data breaches in the modern day1. It’s important to use tools and
technology that improve the organization’s visibility into where its crucial data is
located and how it is used1.
Federated Databases
Federated databases are a type of meta-database management system (DBMS) that
transparently maps multiple autonomous database systems into a single federated
database1. Here are some key points about federated databases in the context of
information security:
Remember, while these measures can enhance the security of mobile databases,
they also require careful management to mitigate potential risks. It’s important to
stay updated with the latest security practices and threats in the mobile
environment.
Network Security
Network security is a critical aspect of information security. It involves the
policies, processes, and practices adopted to prevent, detect, and monitor
unauthorized access, misuse, modification, or denial of a computer network and
network-accessible resources1. Here are some key points about network security:
Remember, while these measures can enhance the security of networks, they also
require careful management to mitigate potential risks. It’s important to stay
updated with the latest security practices and threats in the network environment.
The separation between trusted and untrusted networks is crucial for maintaining
network security4. This separation can be achieved through various means,
including encryption, device partitioning, and network traffic filtering4. In the
context of VoIP and IP networking, trusted and untrusted zones are defined by
where the security control devices are located5.
However, connecting trusted and untrusted networks can pose significant security
challenges. For instance, untrusted clients could contain malware that threatens the
security of the trusted network3. Therefore, careful management and robust
security measures are required when dealing with both trusted and untrusted
networks.
Network attacks
Network attacks are unauthorized actions on the digital assets within an
organizational network. They are usually executed by malicious parties to alter,
destroy, or steal private data1. Here are some common types of network attacks:
1. Physical Network Security: This includes protecting the data and network
through unauthorized personnel from acquiring control over the
confidentiality of the network1.
2. Technical Network Security: It primarily focuses on protecting the data
stored in the network or data involved in transitions through the network1.
3. Administrative Network Security: This level of network security protects
user behavior like how the permission has been granted and how the
authorization process takes place1.
4. Access Control: Not every person should have a complete allowance for the
accessibility to the network or its data1.
5. Confidentiality: The degree of confidentiality determines the secrecy of the
information2.
6. Authentication: Authentication is the mechanism to identify the user or
system or the entity2.
7. Integrity: Integrity gives the assurance that the information received is
exact and accurate2.
8. Non-Repudiation: Non-repudiation is a mechanism that prevents the denial
of the message content sent through a network2.
9. Availability: The principle of availability states that the resources will be
available to authorize party at all times2.
These dimensions highlight the complexity of network security and the need for a
multi-faceted approach to protect against a wide range of potential threats.
Remember, while firewalls can significantly enhance network security, they are
just one part of a comprehensive security strategy. It’s important to also consider
other security measures such as intrusion detection systems (IDS), secure network
architecture, and security policies3.
These points highlight the importance of balancing direct marketing practices with
privacy concerns. It’s crucial for organizations to respect user privacy and comply
with relevant regulations while conducting direct marketing activities.
Privacy –Outsourcing using data masking
Data masking, also known as data obfuscation, is a technique used to protect
sensitive data12. It replaces the actual data with modified content like characters or
numbers, creating an alternate version of data that cannot be easily identifiable or
reverse engineered12. Here are some key points about using data masking in
outsourcing:
1. Protects Sensitive Data: Data masking is ideal when you need to use or
share data but must protect it for privacy and security reasons3. It allows
outsourcing of data-related tasks to third-party vendors without
compromising the security43.
2. Reduces Risks: Data masking decreases security risks when viewing data
analytics4. It also avoids risks associated with outsourcing any project2.
Because most organizations merely rely on trust when dealing with
outsourced persons, masking prevents data from being misused or stolen2.
3. Types of Data Masking: There are several types of data masking types you
can use depending on your use case2. Of the many, static and on-the-fly data
masking are the most common2. Static data masking generally works on a
copy of a production database2. Dynamic data masking (also known as on-
the-fly data masking) masks data while it is transferred from production
systems to test or development systems before the data is saved to disk1.
These points highlight the importance of data masking in outsourcing. It’s crucial
for organizations to respect user privacy and comply with relevant regulations
while conducting outsourcing activities.
These issues highlight the need for robust security measures and privacy
protections when using smart card applications. It’s crucial for organizations to
respect user privacy and comply with relevant regulations while using these
technologies.
Ethical Hacking
Ethical hacking, also known as white-hat hacking, is the practice of performing
security assessments using the same techniques that hackers use, but with proper
approvals and authorization from the organization you’re hacking into12. Here are
some key points about ethical hacking:
digital signatures
Digital signatures are a cryptographic technique used to verify the authenticity and
integrity of digital documents, messages, and transactions123. Here are some key
points about digital signatures in information security: