Control Mechanism for Risk Concern in Computer network

A Security Mechanism for Risk Concern Areas in Computer Networks is a method or technology that protects data and systems from unauthorized access, attacks, and other threats.

A cyber threat or cyber-security threat is a malicious act that generally hunts for damaging data, steals data or disrupts digital life. The perpetrators of these attacks are organized crime groups, terrorists, industrial spies, unhappy insiders, business competitors, hackers, and Nation states. We have explained in our previous article WHAT ARE CYBER THREATS OF DIFFERENT TYPES?

Security controls refer to any type of safeguard or countermeasure used to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. Organizations can protect sensitive information and maintain secure network communication by using techniques such as encipherment, access control, notarization, and digital signatures. Now we will read Control Mechanism for Risk Concern Areas in Computer Networks.

Encipherment :

Encipherment is the opposite of decipherment. It is the process of converting a readable message into an unreadable code or cipher, also known as ciphertext, using a cryptographic algorithm. It is achieved by two famous techniques named Cryptography and Encipherment.

Access Control:

Access control is a data security process that enables organizations to manage who is authorized to access corporate data and resources and in what circumstances. Secure access control uses policies that verify users are who they claim to be and ensure appropriate control access levels are granted to users. This mechanism is used to stop unattended access to data that you are sending. It can be achieved by various techniques such as applying passwords, using a firewall, or just by adding a PIN to data. In the same way that keys and preapproved guest lists protect physical spaces, access control policies protect digital spaces. The 3 types of access control are Role-Based Access Control (RBAC) systems, Attribute-Based Access Control (ABAC), and Discretionary Access Control (DAC).

Notarization:

Notarization is a security mechanism that uses a trusted third party to confirm the properties of a data exchange. It can be used to prove that a file is authentic and has not changed since it was backed up. Notarization is recommended for backing up legal documents or other files that require proven authenticity.

Data Integrity:

Data integrity is the process of ensuring that data is accurate, complete, consistent, and valid throughout its life cycle. It’s a critical aspect of any system that stores, processes or retrieves data. Data integrity is important because it protects against data loss and leaks, and helps organizations maintain user trust, Supports regulatory compliance, and Prevents data breaches.

Authentication Exchange:

Authentication exchange is a security mechanism that verifies the identity of an entity by exchanging information to prevent unauthorized access to secure information. It involves a series of authentication information transfers to perform an authentication. This security measure is achieved at the TCP/IP layer where the two-way handshaking mechanism is used to ensure whether data is sent or not.

Some examples of authentication techniques include:

Using a password or character sequence that is known only to you or the program

Using a key card or other physical authorization that is unique to you

Using your fingerprints, signature, or other item that identifies only you

Bit Stuffing:

In data transmission and telecommunications, bit stuffing is the insertion of non-information bits into a data transmission to provide signaling information to a receiver. The receiver knows how to detect, remove, or disregard the stuffed bits. It is normally achieved by ‘Even parity or Odd Parity’.

 Digital Signature:

A digital signature is a form of electronic signature added by the sender and checked by the receiver electronically. It involves a mathematical algorithm that verifies the authenticity of digital information, such as emails, documents, or credit card transactions. This security mechanism is achieved by adding digital data that is not visible.

Security Considerations related Posts:

What are Cyber Threats of Different types?Control Mechanism for risk concerning Computer networkComputer Audit/IT Audit  
Understanding IS security and IS auditEvaluation Requirement for IT SecurityWhat are Data Security and Privacy?
What is Digital rights management (DRM)?  
Surendra Naik

Share
Published by
Surendra Naik

Recent Posts

Distinction between Capital Receipt and Revenue Receipts

There are two different types of receipts that a business or a government generates during…

14 mins ago

Govt. revises norms for Dividend payout, Bonus Shares, Stock split, and Share buybacks

The Department of Investment and Public Asset Management (DIPAM) released new guidelines amending its earlier2016…

3 hours ago

Bank Holidays 2025: National Capital Territory Delhi

The Government of the National Capital Territory of Delhi has released the official list of…

1 day ago

Bank Holidays 2025: State of Rajasthan

The Government of Rajasthan in their Order No.16 (1).v.m./2024 dated 19.11.2024 declared bank Holidays under…

1 day ago

Distinguishing Capital expenditure and Revenue expenditure

Meaning of Expenditure and Expenses: Expenditure refers to the total amount spent to acquire goods…

1 day ago

Bank Holidays 2025: Gujarat State

In pursuance of the explanation in section 25 of NI Act 1881, read with the…

2 days ago