written 5.8 years ago by | • modified 5.8 years ago |
OR
List components of information security and describe each of them.
Subject: Mobile Computing
Difficulty: Medium
Marks: 4 Marks
written 5.8 years ago by | • modified 5.8 years ago |
OR
List components of information security and describe each of them.
Subject: Mobile Computing
Difficulty: Medium
Marks: 4 Marks
written 5.8 years ago by |
Information security is an art of keeping the message secret i.e. to encrypt and hide it from others getting to know it. The components are: (CIANATA)
1. Confidentiality: It is the property where the information is kept secret so that unauthorized persons cannot get at the information. It is ensured through Encryption of data.
2. Integrity: Integrity is achieved by adding additional information into a message. It is done though checksums, message digests or digital signature. The receiver of the message checks this extra information to verify whether the message has been tampered.
3. Authentication: It is a process by which we validate the identity of the parties involved in a transaction.
4. Non-repudiation: In non-repudiation, we identify these parties beyond any point of doubt. Non repudiation does not allow the sender of the message to refute the claim of not sending that message.
5.Availability: Media Management is part of the larger security framework. It is essential to ensure availability of service.
6. Trust: Trust involves developing a security policy, assigning credentials to entities, verifying that the credentials fulfill the policies.
7. Accounting: It is the process by which usage of service is metered. Based on the usage, the services provider collects the fees either directly from the customer or through home network. This will be true even if the user is roaming in a foreign network and using the services in a foreign network.