Security Dimensions and Security Components in Information and Network Security
Security is a wide concept that consist-of a broad scope of features and practiced in different degrees of abstraction of integration model. Most importantly, security is principally a people driven, as opposed to a software driven, which is a challenge.
Security is an expansive and profound field, both all alone and as a basic dimension in integration of business. This is just an outline.
In this segment, let’s understand the following topics:
Security Dimensions: the features that are considered in security.
Security Components: the most common specialized and technical security components/abilities.
Security Dimensions
These are the main Security Dimensions considered in the security community:
1. Authentication: the check of an identity; who is this ?
2. Authorization: the authorization to carry out a movement in the system; what can this do ?
3. Availability: the capacity to withstand and additionally handle a security attack on the system.
4. Confidentiality: the protection of private information, both in transit and once that it is stored somewhere; guaranteeing that right individuals can read or write this information.
5. Integrity: the assurance that the private information may not be altered neither by technical issues nor any intrusion.
6. Accounting and Auditing: the logging of client activities with the end goal of forensics, pattern recognition, any risk investigation, etc.
Security Components
Important security-related software and network components and abilities:
1. Identity Provider (IdP): the registration of different accounts; ordinarily of user and password phrase pairs. The actual passwords can regularly be checked yet not uncovered.
2. Policy Decision Point (PDP): the component which takes a particular security decision. For instance, the decision to forbid a customer application for some time period.
3. Policy Enforcement Point (PEP): the component which implements the security decision taken by the PDP. For instance, the proxy server that denies the access to a customer application.
4. Encryption / Decryption Point: the component which encrypts and decrypts the private or any kind of information. For instance, SSL enabled server and customer applications.
5. Demilitarized Zone (DMZ): a network of nodes in which different nodes may trust in each other.
Thank You for reading.
Find Me On Twitter — @rajeshposts