0% found this document useful (0 votes)
37 views2 pages

Authentication User Name Passworrd Biometric Spam - Phising Spoof Authorization

This document summarizes key concepts in information security including authentication, authorization, availability, confidentiality, non-repudiation and auditing, and integrity. Authentication verifies the identity of users, authorization determines what resources users can access, availability ensures systems remain accessible to legitimate users, and confidentiality keeps data private. Non-repudiation and auditing use effective logging to confirm user actions. Integrity protects data from unauthorized or accidental modification.

Uploaded by

yushveer002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views2 pages

Authentication User Name Passworrd Biometric Spam - Phising Spoof Authorization

This document summarizes key concepts in information security including authentication, authorization, availability, confidentiality, non-repudiation and auditing, and integrity. Authentication verifies the identity of users, authorization determines what resources users can access, availability ensures systems remain accessible to legitimate users, and confidentiality keeps data private. Non-repudiation and auditing use effective logging to confirm user actions. Integrity protects data from unauthorized or accidental modification.

Uploaded by

yushveer002
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Authentication

User name
Passworrd
Biometric
Spam Phising
Spoof

Authorization
Authorization addresses the question: what can you do? It is the process that
governs the resources and operations that the authenticated client is permitted
to access. Resources include files, databases, tables, rows, and so on, together
with system-level resources such as registry keys and configuration data.
Operations include performing transactions such as purchasing a product,
transferring money
from one account to another, or increasing a customers credit rating.

Availability
Firewall Denial of Service
Backup
Virus
Worm
Disaster Recovery Site
Redundancy
Load Balancing
Caching
From a security perspective, availability means that systems remain available for
legitimate users. The goal for many attackers with denial of service attacks is to
crash an application or to make sure that it is sufficiently overwhelmed so that
other users cannot access the application.
Confidentiality
Confidentiality, also referred to as privacy, is the process of making sure that
data
remains private and confidential, and that it cannot be viewed by unauthorized
users or eavesdroppers who monitor the flow of traffic across a network.
Encryption is frequently used to enforce confidentiality. Access control lists (ACLs)
are another means of enforcing confidentiality.
Chapter 1: Web Application Security Fundamentals 5

Non Redupidiation and Auditing


Effective auditing and logging is the key to non-repudiation. Non-repudiation

guarantees that a user cannot deny performing an operation or initiating a


transaction. For example, in an e-commerce system, non-repudiation
mechanisms
are required to make sure that a consumer cannot deny ordering 100 copies of a
particular book.
Integrity
Integrity is the guarantee that data is protected from accidental or deliberate
icatio(malicious) modification. Like privacy, integrity is a key concern, particularly
for
data passed across networks. Integrity for data in transit is typically provided by
using hashing techniques and message authentication codes.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy