Shanto Mariam University of Creative Technology: Department of Computer Science and Engineering
Shanto Mariam University of Creative Technology: Department of Computer Science and Engineering
Department: CSE
ID: 181071019
Batch: 17th
Semester: 7th
Date of Submission: 11 June 2020.
1. Security Threat: Make a short discussion on
the followings:
i. Authentication
ii. Authorization
iii. Confidentiality
iv. Data / Message Integrity
v. Accountability
vi. Availability
a.Authentication
b.Authorization
c.Confidentiality
Accountability means making sure every action can be tracked back to a single
person, not just a group or ID. And it requires more culture change, and needs to be
handled with a light touch.
Additional thoughts:
f.Availability
For any information system to serve its purpose, the information must be available when
it is needed. This means the computing systems used to store and process the
information, the security controls used to protect it, and the communication channels
used to access it must be functioning correctly. High availability systems aim to remain
available at all times, preventing service disruptions due to power outages, hardware
failures, and system upgrades. Ensuring availability also involves preventing denial-of-
service attacks, such as a flood of incoming messages to the target system, essentially
forcing it to shut down.
In the realm of information security, availability can often be viewed as one of the most
important parts of a successful information security program. Ultimately end-users need
to be able to perform job functions; by ensuring availability an organization is able to
perform to the standards that an organization's stakeholders expect. This can involve
topics such as proxy configurations, outside web access, the ability to access shared
drives and the ability to send emails. Executives oftentimes do not understand the
technical side of information security and look at availability as an easy fix, but this often
requires collaboration from many different organizational teams, such as network
operations, development operations, incident response and policy/change
management. A successful information security team involves many different key roles
to mesh and align for the CIA triad to be provided effectively.
2.Steganography
Steganography is the technique of hiding secret data within an ordinary, non-secret, file
or message in order to avoid detection; the secret data is then extracted at its
destination. The use of steganography can be combined with encryption as an extra
step for hiding or protecting data.