SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
William Stallings
Chapter:
Computer And Network Security Concepts
Exercise:
Review Questions
Question:5 | ISBN:9781292158587 | Edition: 7

Question

List and briefly define categories of security mechanisms.

TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

List of security mechanisms:

  1. Encipherment
  2. Digital Signature
  3. Access Control 
  4. Data Integrity
  5. Authentication Exchange
  6. Traffic Padding
  7. Routing control
  8. Notarization

 

Brief Explanations:

 

1. Encipherment: 

It is the process of transforming the data to unintelligible form using mathematical algorithms and recovery of the data using algorithms or private keys.

 

2. Digital Signature:

To ensure the integrity of data and to protect the recipient from forgery, the data was cryptographically transformed to the recipient.

 

3. Access Control:

The implementation of access rights to the data through different mechanisms.

 

4. Data Integrity:

The integrity of the information or stream of data is ensured by this mechanism.

 

5. Authentication Exchange:

A method of ensuring an entity's identity by means of information exchange.

 

.6. Traffic Padding:

This mechanism is intended to fill the gaps of a data stream to make it hard for eavesdroppers to do traffic analysis.

 

7. Routing Control:

Permits selection of particular physically secure routes for certain data, and allows routing changes, especially when a security breach is suspected

 

8. Notarization:

Assuring certain properties of data exchange with the help of a trusted third party.

0 0

Discussions

Post the discussion to improve the above solution.