Security Dimensions and Security Components in Information and Network Security

Rajesh Prajapati
2 min readMay 6, 2021

--

Security is a wide concept that consist-of a broad scope of features and practiced in different degrees of abstraction of integration model. Most importantly, security is principally a people driven, as opposed to a software driven, which is a challenge.

Security is an expansive and profound field, both all alone and as a basic dimension in integration of business. This is just an outline.

In this segment, let’s understand the following topics:

Security Dimensions: the features that are considered in security.

Security Components: the most common specialized and technical security components/abilities.

Security Dimensions

These are the main Security Dimensions considered in the security community:

1. Authentication: the check of an identity; who is this ?

2. Authorization: the authorization to carry out a movement in the system; what can this do ?

3. Availability: the capacity to withstand and additionally handle a security attack on the system.

4. Confidentiality: the protection of private information, both in transit and once that it is stored somewhere; guaranteeing that right individuals can read or write this information.

5. Integrity: the assurance that the private information may not be altered neither by technical issues nor any intrusion.

6. Accounting and Auditing: the logging of client activities with the end goal of forensics, pattern recognition, any risk investigation, etc.

Security Components

Important security-related software and network components and abilities:

1. Identity Provider (IdP): the registration of different accounts; ordinarily of user and password phrase pairs. The actual passwords can regularly be checked yet not uncovered.

2. Policy Decision Point (PDP): the component which takes a particular security decision. For instance, the decision to forbid a customer application for some time period.

3. Policy Enforcement Point (PEP): the component which implements the security decision taken by the PDP. For instance, the proxy server that denies the access to a customer application.

4. Encryption / Decryption Point: the component which encrypts and decrypts the private or any kind of information. For instance, SSL enabled server and customer applications.

5. Demilitarized Zone (DMZ): a network of nodes in which different nodes may trust in each other.

Thank You for reading.

Find Me On Twitter — @rajeshposts

--

--

Rajesh Prajapati
Rajesh Prajapati

No responses yet