Page 204 - PYTHON-12
P. 204

implemented to a program or process to make data free of risk, such as entering of viruses,
                       worms or Trojan horse.

                   2.  Authentication: To determine the identity of a person before granting access to private
                       or sensitive data or information is known as authentication. Verifying the identity of an
                       intruder or a person is difficult and needs complex protocols based on cryptography.
                   3.  Privacy: The data which is accessible only to an authorized person is known as private
                       data.
                   4.  Secrecy: Hiding some relevant information from an unauthorized person is called secrecy.

                   5.  Biometric  System:  Biometric system forms  the most secure level  of authorization. It
                       involves digital signature, finger prints, retinal patterns, etc., to establish identity.

                   6.  Password Protection: To protect the system or network from an unauthorized person,
                       a system must be password  protected.  A password  protected  system allows  access  to
                       resources based upon a secret word entered by the user.
                   7.  File Permission: A user can give access to a person to read a file, write to a file, open a file,
                       modify a file, etc. Different types of permissions can be given to a specific person according
                       to their authorization. Each file has an access control list attribute that describes which
                       user or group accounts have what type of access to the file.
                      Three types of file access permissions that are granted to a user:

                         (a)  Read: Allows a user to view and read a file.
                         (b)  Write: Allows a user to edit and write on a file.
                         (c)  Execute: Allows a user to execute a file.

                      File access permission is granted to three types of users:
                         (a)  Owner: Refers to the user who has created the file.
                         (b)  Group: Refers to the group of users which is working with the file owner.

                         (c)  Others: Refers to all other users.
                   8.  Firewall: A firewall is a part of a computer system or network that is designed to block
                       unauthorized  access  while permitting authorized  communication. It  is a programmer
                       software or device or set of devices configured to permit, deny, encrypt, decrypt, or proxy
                       wall (in and out) computer traffic between different security domains based upon a set of
                       rules and other criteria.

                   9.  Proper Security Policy: An organization’s security policy is a formal statement consisting
                       of the rules that its employees need to follow to access information about the organization.
           Computer Science with Python–XII  8.50          enforced with adequate security tools.
                       The policy should clearly communicate the security goals to all the users, administrators
                       and managers of  the organization. A good security policy must be:


                            able to define the areas of responsibility for a user, an administrator or a manager.
                            able to adjust itself according to the changing configurations of computer networks.
   199   200   201   202   203   204   205   206   207   208   209