Page 204 - PYTHON-12
P. 204
implemented to a program or process to make data free of risk, such as entering of viruses,
worms or Trojan horse.
2. Authentication: To determine the identity of a person before granting access to private
or sensitive data or information is known as authentication. Verifying the identity of an
intruder or a person is difficult and needs complex protocols based on cryptography.
3. Privacy: The data which is accessible only to an authorized person is known as private
data.
4. Secrecy: Hiding some relevant information from an unauthorized person is called secrecy.
5. Biometric System: Biometric system forms the most secure level of authorization. It
involves digital signature, finger prints, retinal patterns, etc., to establish identity.
6. Password Protection: To protect the system or network from an unauthorized person,
a system must be password protected. A password protected system allows access to
resources based upon a secret word entered by the user.
7. File Permission: A user can give access to a person to read a file, write to a file, open a file,
modify a file, etc. Different types of permissions can be given to a specific person according
to their authorization. Each file has an access control list attribute that describes which
user or group accounts have what type of access to the file.
Three types of file access permissions that are granted to a user:
(a) Read: Allows a user to view and read a file.
(b) Write: Allows a user to edit and write on a file.
(c) Execute: Allows a user to execute a file.
File access permission is granted to three types of users:
(a) Owner: Refers to the user who has created the file.
(b) Group: Refers to the group of users which is working with the file owner.
(c) Others: Refers to all other users.
8. Firewall: A firewall is a part of a computer system or network that is designed to block
unauthorized access while permitting authorized communication. It is a programmer
software or device or set of devices configured to permit, deny, encrypt, decrypt, or proxy
wall (in and out) computer traffic between different security domains based upon a set of
rules and other criteria.
9. Proper Security Policy: An organization’s security policy is a formal statement consisting
of the rules that its employees need to follow to access information about the organization.
Computer Science with Python–XII 8.50 enforced with adequate security tools.
The policy should clearly communicate the security goals to all the users, administrators
and managers of the organization. A good security policy must be:
able to define the areas of responsibility for a user, an administrator or a manager.
able to adjust itself according to the changing configurations of computer networks.