W1-Module 001 Introduction To Network Security
W1-Module 001 Introduction To Network Security
W1-Module 001 Introduction To Network Security
1
Introduction to Network Security
1. Hardware
The term hardware denotes to machinery. It includes all the
components of a tangible parts of a system unit including CPU and its
Network Security
5
Introduction to Network Security
Course Module
If you don’t know how to answer the 2nd question, there will be
a high chance that you are wrong with the 1st question.
There are three basic schemes that are used for authentication
specially when logging onto a network; something you know,
something you have and something you are which described as follows
• Something you know
It is the most commonly employed scheme.
Typically, the one that authenticates your identity is your
password, code or a sequence. Security is based on the
idea that if you know the secret password or code then
you must be who you claim to be and be authorized to
gain access to the network. Although it is not very secure
because it is easy to compromise.
• Something you have
It is based on the ownership of a user. It requires
a key, identification card or a badge, or even a token card
or “thing” that provides you with an access. We all know
that most security is based on the concept that it is only
the authorized person or individuals will only have the
ability to gain access to a specific device or information.
But this scheme has its own drawback as these “thing”
can be stolen or loss.
• Something you are
It depends on some physical or behavioral
characteristics of a person. It is referred to as a Biometric
authentication. Biometrics can validate one’s identity
based on their fingerprints, a voice print or even an iris
scan. These types of system can be extremely difficult to
compromise when designed properly.
Authorization
It occurs after the successful authentication. Authorization
ensures that user includes the permission or privilege to perform
specific action in a network. Your level of authorization determines
what you are allowed to do once you already gain access to a network,
system or other useful resources such as data or information. Access
control determines the level of authorization to a system or network.
This feature is mainly used against any unauthorized disclosure of
confidential files, modification or altering once data and even the
destruction of it. It includes a set of controls that restrict access to
resources based on the group membership or identity.
Accountability
It allows administrators the ability to monitor, track or audit the
activities that users performed at a certain situation. In general,
accountability is being enforced by performing audits as well as
stabling systems to make and keep audit trails. This log management
can be useful in the prospect of IT accountability and data security. It
implements that any action can be determined and traced back.
Network Security
9
Introduction to Network Security
Course Module