Control Mechanism for Risk Concern in Computer network

A Security Mechanism for Risk Concern Areas in Computer Networks is a method or technology that protects data and systems from unauthorized access, attacks, and other threats.

A cyber threat or cyber-security threat is a malicious act that generally hunts for damaging data, steals data or disrupts digital life. The perpetrators of these attacks are organized crime groups, terrorists, industrial spies, unhappy insiders, business competitors, hackers, and Nation states. We have explained in our previous article WHAT ARE CYBER THREATS OF DIFFERENT TYPES?

Security controls refer to any type of safeguard or countermeasure used to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. Organizations can protect sensitive information and maintain secure network communication by using techniques such as encipherment, access control, notarization, and digital signatures. Now we will read Control Mechanism for Risk Concern Areas in Computer Networks.

Encipherment :

Encipherment is the opposite of decipherment. It is the process of converting a readable message into an unreadable code or cipher, also known as ciphertext, using a cryptographic algorithm. It is achieved by two famous techniques named Cryptography and Encipherment.

Access Control:

Access control is a data security process that enables organizations to manage who is authorized to access corporate data and resources and in what circumstances. Secure access control uses policies that verify users are who they claim to be and ensure appropriate control access levels are granted to users. This mechanism is used to stop unattended access to data that you are sending. It can be achieved by various techniques such as applying passwords, using a firewall, or just by adding a PIN to data. In the same way that keys and preapproved guest lists protect physical spaces, access control policies protect digital spaces. The 3 types of access control are Role-Based Access Control (RBAC) systems, Attribute-Based Access Control (ABAC), and Discretionary Access Control (DAC).

Notarization:

Notarization is a security mechanism that uses a trusted third party to confirm the properties of a data exchange. It can be used to prove that a file is authentic and has not changed since it was backed up. Notarization is recommended for backing up legal documents or other files that require proven authenticity.

Data Integrity:

Data integrity is the process of ensuring that data is accurate, complete, consistent, and valid throughout its life cycle. It’s a critical aspect of any system that stores, processes or retrieves data. Data integrity is important because it protects against data loss and leaks, and helps organizations maintain user trust, Supports regulatory compliance, and Prevents data breaches.

Authentication Exchange:

Authentication exchange is a security mechanism that verifies the identity of an entity by exchanging information to prevent unauthorized access to secure information. It involves a series of authentication information transfers to perform an authentication. This security measure is achieved at the TCP/IP layer where the two-way handshaking mechanism is used to ensure whether data is sent or not.

Some examples of authentication techniques include:

Using a password or character sequence that is known only to you or the program

Using a key card or other physical authorization that is unique to you

Using your fingerprints, signature, or other item that identifies only you

Bit Stuffing:

In data transmission and telecommunications, bit stuffing is the insertion of non-information bits into a data transmission to provide signaling information to a receiver. The receiver knows how to detect, remove, or disregard the stuffed bits. It is normally achieved by ‘Even parity or Odd Parity’.

 Digital Signature:

A digital signature is a form of electronic signature added by the sender and checked by the receiver electronically. It involves a mathematical algorithm that verifies the authenticity of digital information, such as emails, documents, or credit card transactions. This security mechanism is achieved by adding digital data that is not visible.

Security Considerations related Posts:

What are Cyber Threats of Different types?Control Mechanism for risk concerning Computer networkComputer Audit/IT Audit  
Understanding IS security and IS auditEvaluation Requirement for IT SecurityWhat are Data Security and Privacy?
What is Digital rights management (DRM)?  
Surendra Naik

Share
Published by
Surendra Naik

Recent Posts

Overview of the IT Act: Gopalakrishna Committee Recommendations

The Gopalakrishnan committee is a committee of experts on the concept of non-personal data (NPD)…

8 hours ago

Understanding IS Security and IS audit

IS security or information security refers to the protection of information systems against unauthorized access…

1 day ago

Evaluation requirement for IT security

Evaluation requirement for IT Security refers to the procedure of conducting regular reviews and checks…

2 days ago

Computer Audit/IT Audit

Computer audits, also known as IT audits, are important because they help organizations protect their…

2 days ago

Impact of IT on Banks and Fintech Disruption: Overview

The banking sector has undergone an intense transformation in recent years, driven by rapid advancements…

4 days ago

Need  for Technological up gradation: Rise and fall of global companies

Technological upgrading refers to the planned and focused improvement of existing technology and production methods…

4 days ago