0% found this document useful (0 votes)
13 views

Introduction To Security

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Introduction To Security

Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Introduction to Security

Security is a fundamental aspect of operating systems and computing. It


encompasses various goals, including confidentiality, integrity, availability, and
accountability. Confidentiality ensures that sensitive information is protected
from unauthorized access, while integrity focuses on maintaining the accuracy
and consistency of data. Availability ensures that resources are accessible when
needed, and accountability holds individuals responsible for their actions within
the system.
Access Control

1 Discretionary Access Control (DAC)


DAC allows users to control access to their own resources. Each user can determine who can
access their files or other resources and specify what level of access they have.

2 Mandatory Access Control (MAC)


MAC is based on security labels assigned to resources and subjects. The system enforces these
labels to control access, and users do not have discretion in determining access to their resources.

3 Role-based Access Control (RBAC)


RBAC assigns permissions to roles, and users are then assigned to these roles. This simplifies the
management of permissions and access, especially in large organizations with many users.
Authentication

1 Passwords 2 Biometrics
Passwords are the most common method of Biometric authentication uses unique
authentication. They require users to prove biological features such as fingerprints, iris
their identity by entering a unique combination patterns, or facial recognition to verify identity,
of characters. providing strong security.

3 Smart Cards 4 Two-factor Authentication


Smart cards contain an integrated circuit that Two-factor authentication combines two
provides secure storage and processing different components, such as a password and a
capabilities, making them suitable for unique code sent to a mobile device, adding an
authentication and secure transactions. extra layer of security.
Authorization
Permissions Access Control Lists (ACLs)

Permissions define what actions (read, write, ACLs are lists of permissions attached to an object
execute) are allowed on a resource for different users that specify which users or system processes are
or groups, providing granular control over access. granted access rights to the object.
User Accounts
User Authentication Account Management
User authentication verifies the identity of a user Account management includes the creation,
attempting to access a system, typically through a deletion, and modification of user accounts,
username and password. ensuring proper control and oversight of system
access.

Password Policies Account Lockout Mechanisms


Implementing strong password policies helps Account lockout mechanisms suspend or disable
protect user accounts from unauthorized access an account after a specified number of failed login
and potential security breaches. attempts, enhancing security against brute-force
attacks.
File System Security
File Permissions
File permissions determine who can access, read, write, or execute a file. They are set
for owner, group, and other users.

Encryption
Encryption converts data into a code, preventing unauthorized access to the data and
ensuring confidentiality.
Network Security

Firewalls Intrusion Secure Communication


Detection/Prevention Protocols
Firewalls monitor and control
incoming and outgoing network These systems monitor network or Secure Sockets Layer (SSL) and
traffic, acting as a barrier between system activities for malicious Transport Layer Security (TLS)
a trusted internal network and activities or policy violations and provide secure communication
untrusted external networks. take appropriate actions to prevent over a computer network to
them. prevent eavesdropping and
tampering.
Malware Protection
Viruses Viruses replicate and spread by attaching to
executable files. They can cause damage to the
system and data.

Worms Worms are standalone malware that replicate and


spread over computer networks, consuming
bandwidth and causing harm.

Trojans Trojans appear to be legitimate software but


perform malicious actions when executed, often
providing unauthorized access to the system.
Security Best Practices
Patches & Strong Principle of Least Data Backup
Updates Authentication Privilege
Regularly backing up
Regularly applying Emphasizing strong Following the data helps prevent
patches and updates authentication principle of least data loss due to
helps resolve known methods, including privilege ensures that hardware failure,
vulnerabilities and multi-factor users have only the malware, or accidental
strengthens the authentication, access rights needed deletion, contributing
security posture of the enhances user identity to perform their tasks, to data integrity and
system. verification and access minimizing potential availability.
control. damage from
accidental actions.

You might also like