لخّصلي

خدمة تلخيص النصوص العربية أونلاين،قم بتلخيص نصوصك بضغطة واحدة من خلال هذه الخدمة

نتيجة التلخيص (55%)

Cyber Security Essentials Chapter_1 Dr. Sarah Mohamed 1 1..Biometrics can be human characteristics, for instance, fingerprint, face recognition, Biometrics can be human characteristics, for instance, fingerprint, face recognition, iris recognition, retina and palm printiris recognition, retina and palm print as shown in the following figure:as shown in the following figure: Figure 1: Biometric authentication methods 1.3.2 Encryption It is a technique to convert the data in unreadable form before transmitting it over the internet.There areThere are many applications of many applications of steganography, whichsteganography, which includes sending secret messages includes sending secret messages without ringing the alarms, preventing secret files from unauthorized and accidental access without ringing the alarms, preventing secret files from unauthorized and accidental access and and theft,theft, digital watermarks for IPR issues, etc.digital watermarks for IPR issues, etc.Biometric based AuthenticationBiometric based Authentication:: Biometric based authentication is a security Biometric based authentication is a security process that relies on the unique biological characteristics of an individual to process that relies on the unique biological characteristics of an individual to identify the useridentify the user''ss identity;identity; biometric authentication is used to manage access to biometric authentication is used to manage access to physical and digital resources such as buildings, rooms and computing devices.physical and digital resources such as buildings, rooms and computing devices.Authorization is the process of verifying what you have access to. verifying what you have access to. TThere are three main types of authentication here are three main types of authentication mechanisms, password entry, mechanisms, password entry, and smartcardand smartcard and biometricand biometric:: ?Software Firewalls: Software Firewalls: These firThese firewewalls are installed andalls are installed and on the server and client machines on the server and client machines and it acts as a gaand it acts as a gateway to the organizationsteway to the organizations network.UnknownUnknown: Those who have not prese: Those who have not presented authenticated credentialsnted authenticated credentials Every individual who initially approaches an access control system is unknown until he or Every individual who initially approaches an access control system is unknown until he or she attempts to authenticate.Password Based AuthenticationPassword Based Authentication:: The server maintains a list of names and The server maintains a list of names and passwords, if a particular name is on the list, and if the user types the correct passwords, if a particular name is on the list, and if the user types the correct ppassword, the server grants access.assword, the server grants access.Only the person who have the access to the key, convert it in the readable form, and read it. Formally, encryption can be defined as a technique to lock the data by converting it to complex codes using mathematical algorithms.1.3.4 1.3.4 FirewallFirewall It is a hardware/ It is a hardware/software, whichsoftware, which acts as a shield between an organizationacts as a shield between an organization''s network and the s network and the internet and protects it from the threats like virus, malware, hackers, etc.The antivirus program regularly updates its database and provides immunity to the system against these program regularly updates its database and provides immunity to the system against these new viruses, worms, etc.new viruses, worms, etc.Identity management Identity management is the process of creating, maintaining, and is the process of creating, maintaining, and removingremoving user accounts user accounts and providing the mechanisms used to authenticate usersand providing the mechanisms used to authenticate users.Cyber Cyber security refers to the protection osecurity refers to the protection of computer devices, systems, networks and f computer devices, systems, networks and programs from programs from cybercyber--attacksattacks.Attackers use new methods, which are powered by social engineering, artificial intelligence and machine leartificial intelligence and machine learning, to bypass security checks.arning, to bypass security checks.Token based Authentication:Token based Authentication: Token based authentication is a security technique Token based authentication is a security technique that authenticates the user who attempt to login to a server, a network, or some other that authenticates the user who attempt to login to a server, a network, or some other secure system, using a security token provided by the secure system, using a security token provided by the server.Figure 2: Encryption 1.3.3 1.3.3 AntivirusAntivirus There are There are varieties varieties of malicious programs like virus, worms, of malicious programs like virus, worms, TrojanTrojan horse, etc.Figure 3: Different antivirus available on the market Using firewall, it is possible to configure and mo Using firewall, it is possible to configure and monitor the traffic of the ports (nitor the traffic of the ports (A port is a A port is a virtual point where network connections start and end.ToolsTools:: Technical methods, such as file system access controls and network firewalls, Technical methods, such as file system access controls and network firewalls, used to enforce policiesused to enforce policies..They utilize the network by collecting, processing, storing, and sharing vast amounts of digital information.As more digital information is gathered and shared, the protection of this informgathered and shared, the protection of this information is becoming even more vital to our ation is becoming even more vital to our national security and economic stability.national security and economic stability.1.3 1.3 CCyber security yber security techniquestechniques There are many cyber security techniques to combat the cyber security attacks.Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port than webpages, for instance, even though bemails go to a different port than webpages, for instance, even though both reach a oth reach a computer over the same Internet connection.computer over the same Internet connection.)) Examples: Examples: ?Access control deals with Access control deals with subjects, objects and access rights as shown on the following subjects, objects and access rights as shown on the following figure:figure: Organizations rely upon access controls to grant and restrict user access to information, Organizations rely upon access controls to grant and restrict user access to information, systems, and other resources.Access control systems, when properly designed;designed; implement implement business rules and business rules and oftenoften--directdirect implementations of policy in such a manner thaimplementations of policy in such a manner that individuals t individuals have access to the information and resources needed to perform their responsibilities but have access to the information and resources needed to perform their responsibilities but no more.no more.Theoretically, identity management allows you to confirm that a person is who they claim to be (authentication), management allows you to confirm that a person is who they claim to be (authentication), and access control allows you to restrict his or her activities to authorized actions and access control allows you to restrict his or her activities to authorized actions (authorization).ObjectsObjects----The resource to which the The resource to which the subject desires access (e.g., files, databases, subject desires access (e.g., files, databases, printers, and physical facilities)printers, and physical facilities) Any time you have to decide whether to allow or deny access by a subject to a resource, Any time you have to decide whether to allow or deny access by a subject to a resource, you have entered the access control problem domain.you have entered the access control problem domain.ProceduresProcedures: Nontechnical methods, such as business processes and background : Nontechnical methods, such as business processes and background checks, used to enforce policieschecks, used to enforce policies ?On the other hand, if the user''s s password is correct, the system now knows with certainty who the user is and must check password is correct, the system now knows with certainty who the user is and must check to see if the user is authorizeto see if the user is authorized to access the requested resource.CyberCyber securitysecurity is protecting is protecting yourself yourself fromfrom someone stealing your digitalsomeone stealing your digital information/personal data or from information/personal data or from pretending to act as you online.pretending to act as you online.1.3.1 Authentication 1.3.1 Authentication It is a process of identifying an individual and ensuring that the individual is the same who It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be.he/she claims to be. Authentication is a process of granting a user access to Authentication is a process of granting a user access to an information an information system.system.It not only prevents the malicious code to enter the system but also detects and destroys the malicious code that is alcode to enter the system but also detects and destroys the malicious code that is already ready installed into the system.Only the packets from trusted Only the packets from trusted ssource address can enter the organizationource address can enter the organization''s network and the s network and the sources, which are blacklisted and sources, which are blacklisted and unauthorized address,unauthorized address, are denied access to the network.Access controls define the allowable interactions between subjects and objects.Itcontrols define the allowable interactions between subjects and objects.Preventing legalPreventing legal users from accessing resources in an unauthorized mannerusers from accessing resources in an unauthorized manner ?AuthoAuthorizedrized: Those who have presented authenticated credentials and have been : Those who have presented authenticated credentials and have been approved for access to the resource approved for access to the resource ?UnauthorizedUnauthorized: Those who have presented authenticated credentials but are not : Those who have presented authenticated credentials but are not approved for access to the resource approved for access to the resource ?IntroductionIntroduction to cyberto cyber security security The connected electronic information network has become an integral part of our daily The connected electronic information network has become an integral part of our daily lives.CyberCyber--attacksattacks are a globally increasing and evolving threat are a globally increasing and evolving threat to sensitive data.The next section discusses section discusses some of the popular techniques to counter the cybersome of the popular techniques to counter the cyber--attacks.attacks.Users are identified using different authentication mechanismusing different authentication mechanismss.In a security system,system, the authentication process the authentication process checks the information provided by the user with the datachecks the information provided by the user with the database.base.that are spread over internet to compromise the security of a computer either to destroy data stored spread over internet to compromise the security of a computer either to destroy data stored into the computer or gain financial benefits by sniffing passwords etc.It is important to have firewalls to prevent the network from unauthorized access, but It is important to have firewalls to prevent the network from unauthorized access, but firewall does not guarantee this until and unless it is configured correctly.A firewall can be implemented usingbe implemented using hardware as well as software or the combination of both.hardware as well as software or the combination of both.Figure 4: Firewall Hardware Firewalls Hardware Firewalls: example of hardware firewalls are routers through which the : example of hardware firewalls are routers through which the network is connected to the network outside the organization i.e. network is connected to the network outside the organization i.e. InternetInternet.Access control implements a security policy that specifies who or what (e.g. process may Access control implements a security policy that specifies who or what (e.g. process may have access to each specific system resource and the type of access that ishave access to each specific system resource and the type of access that is permitted in each permitted in each instance.instance.Preventing Preventing unauthorized users from gaining access to resources (deals more with unauthorized users from gaining access to resources (deals more with authentication)authentication) ?SubjectsSubjects----The user, network, process, or application requesting access to a resourceThe user, network, process, or application requesting access to a resource ?They utilize the network by collecting, processing, this network to operate effectively.As more digital information is storing, and sharing vast amounts of digital information.Cyber Cyber security is the ongoing effort to protect these networked systems and all of the data security is the ongoing effort to protect these networked systems and all of the data from unauthorized use or harm.At the companycompany level, it is everyonelevel, it is everyone''s s resresponsibility to protect the organizationponsibility to protect the organization''s reputation, data, and customers.Attackers use new methods, which are powered by social engineering, to sensitive data.GGovernmental and industry information systems fromovernmental and industry information systems from theft and damage attemptheft and damage attempted ted by by criminals.criminals.The next There are many cyber security techniques to combat the cyber security attacks.Authentication is a process of validating the userAuthentication is a process of validating the user''s identity.Biometrics are a strong authentication method based on certain human Biometrics are a strong authentication method based on certain human characteristics.The human characteristics are distinct to each individualre distinct to each individual..To prevent these into the computer or gain financial benefits by sniffing passwords etc.It can be used to internet and protects it from the threats like virus, malware, hackers, etc.1.3.5 1.3.5 SteganographySteganography It is a technique of hiding secret messages in a document file, image file, and program or It is a technique of hiding secret messages in a document file, image file, and program or protocol etc.Access can be defined in terms of social rules, physical barriers, or can be defined in terms of social rules, physical barriers, or informational restrictions.informational restrictions.The purpose of access control is to provide quick, convenient access control for The purpose of access control is to provide quick, convenient access control for authorized persons, while at the same time, restricting access for unauthorized people.authorized persons, while at the same time, restricting access for unauthorized people.Enabling Enabling legallegal users to access resources in an authorized manner.users to access resources in an authorized manner.Access Control Systems Access Control Systems A well A well--defdefined access control system consists of three elements:ined access control system consists of three elements: ?Access Control Subjects Access Control Subjects The subject in an access The subject in an access--control scenario is a person or another application requesting control scenario is a person or another application requesting access to a resource such as the network, a file system, or a printer.Someone allowed to access the resource moves to the the resource moves to the ""authorizedauthorized" " state. Otherwise, the user is still known, but now state. Otherwise, the user is still known, but now moves to the moves to the ""unauthorizedunauthorized" " state.state.PPrivate informationrivate information ?(authorization)..????????????????..????????????


النص الأصلي

Cyber Security Essentials
Chapter_1
Dr. Sarah Mohamed
1
1.. IntroductionIntroduction to cyberto cyber security security
The connected electronic information network has become an integral part of our daily
The connected electronic information network has become an integral part of our daily lives. All types of organizations, such as medical, financial, and lives. All types of organizations, such as medical, financial, and education institutions, use education institutions, use this network to operate effectively. They utilize the network by collecting, processing, this network to operate effectively. They utilize the network by collecting, processing, storing, and sharing vast amounts of digital information. As more digital information is storing, and sharing vast amounts of digital information. As more digital information is gathered and shared, the protection of this informgathered and shared, the protection of this information is becoming even more vital to our ation is becoming even more vital to our national security and economic stability.national security and economic stability.
1.1 What is
1.1 What is ccyberyber security?security?
Cyber
Cyber security is the ongoing effort to protect these networked systems and all of the data security is the ongoing effort to protect these networked systems and all of the data from unauthorized use or harm. On a personal level, you need to safeguard your identity, from unauthorized use or harm. On a personal level, you need to safeguard your identity, your data, and your computing devices. At the your data, and your computing devices. At the companycompany level, it is everyonelevel, it is everyone’’s s resresponsibility to protect the organizationponsibility to protect the organization’’s reputation, data, and customers. s reputation, data, and customers. CyberCyber securitysecurity is protecting is protecting yourself yourself fromfrom someone stealing your digitalsomeone stealing your digital information/personal data or from information/personal data or from pretending to act as you online.pretending to act as you online.
Cyber
Cyber security refers to the protection osecurity refers to the protection of computer devices, systems, networks and f computer devices, systems, networks and programs from programs from cybercyber--attacksattacks. . CyberCyber--attacksattacks are a globally increasing and evolving threat are a globally increasing and evolving threat to sensitive data. Attackers use new methods, which are powered by social engineering, to sensitive data. Attackers use new methods, which are powered by social engineering, artificial intelligence and machine leartificial intelligence and machine learning, to bypass security checks.arning, to bypass security checks.
1.2
1.2 WWhy cyberhy cyber security is important?security is important?
Cyber security
Cyber security is important, because it helps us protectis important, because it helps us protect::

 OOur sensitive data, personallyur sensitive data, personally

 IIdentifiable information (PII) dentifiable information (PII)

 PProtected health information (PHI)rotected health information (PHI)

 PPrivate informationrivate information

 IIntellectual property datantellectual property data

 GGovernmental and industry information systems fromovernmental and industry information systems from theft and damage attemptheft and damage attempted ted by by criminals.criminals.
1.3
1.3 CCyber security yber security techniquestechniques
There are many cyber security techniques to combat the cyber security attacks. The next
There are many cyber security techniques to combat the cyber security attacks. The next section discusses section discusses some of the popular techniques to counter the cybersome of the popular techniques to counter the cyber--attacks.attacks.
1.3.1 Authentication
1.3.1 Authentication
It is a process of identifying an individual and ensuring that the individual is the same who
It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be.he/she claims to be. Authentication is a process of granting a user access to Authentication is a process of granting a user access to an information an information system.system. Authentication is a process of validating the userAuthentication is a process of validating the user’’s identity. Users are identified s identity. Users are identified using different authentication mechanismusing different authentication mechanismss. In a security . In a security system,system, the authentication process the authentication process checks the information provided by the user with the datachecks the information provided by the user with the database.base. Authentication means Authentication means confirming your own identity. confirming your own identity. AuthorizationAuthorization means granting access to the system. means granting access to the system. Authentication is the process of verifying who you are. Authorization is the process of Authentication is the process of verifying who you are. Authorization is the process of verifying what you have access to. verifying what you have access to. TThere are three main types of authentication here are three main types of authentication mechanisms, password entry, mechanisms, password entry, and smartcardand smartcard and biometricand biometric::

 Password Based AuthenticationPassword Based Authentication:: The server maintains a list of names and The server maintains a list of names and passwords, if a particular name is on the list, and if the user types the correct passwords, if a particular name is on the list, and if the user types the correct ppassword, the server grants access.assword, the server grants access.

 Token based Authentication:Token based Authentication: Token based authentication is a security technique Token based authentication is a security technique that authenticates the user who attempt to login to a server, a network, or some other that authenticates the user who attempt to login to a server, a network, or some other secure system, using a security token provided by the secure system, using a security token provided by the server. The service validates server. The service validates the security token and process the user request.the security token and process the user request.

 Biometric based AuthenticationBiometric based Authentication:: Biometric based authentication is a security Biometric based authentication is a security process that relies on the unique biological characteristics of an individual to process that relies on the unique biological characteristics of an individual to identify the useridentify the user’’ss identity;identity; biometric authentication is used to manage access to biometric authentication is used to manage access to physical and digital resources such as buildings, rooms and computing devices.physical and digital resources such as buildings, rooms and computing devices. Biometrics are a strong authentication method based on certain human Biometrics are a strong authentication method based on certain human characteristics. The human characteristics acharacteristics. The human characteristics are distinct to each individualre distinct to each individual.. Biometrics can be human characteristics, for instance, fingerprint, face recognition, Biometrics can be human characteristics, for instance, fingerprint, face recognition, iris recognition, retina and palm printiris recognition, retina and palm print as shown in the following figure:as shown in the following figure:
Figure 1: Biometric authentication methods
1.3.2 Encryption
It is a technique to convert the data in unreadable form before transmitting it over the
internet. Only the person who have the access to the key, convert it in the readable form,
and read it. Formally, encryption can be defined as a technique to lock the data by
converting it to complex codes using mathematical algorithms. The code is so complex that
it even the most powerful computer will take several years to break the code. This secure
code can safely be transmitted over internet to the destination. The receiver, after receiving
the data can decode it using the key. The decoding of the complex code to original text
using key is known as decryption.
Figure 2: Encryption
1.3.3
1.3.3 AntivirusAntivirus
There are
There are varieties varieties of malicious programs like virus, worms, of malicious programs like virus, worms, TrojanTrojan horse, etc. that are horse, etc. that are spread over internet to compromise the security of a computer either to destroy data stored spread over internet to compromise the security of a computer either to destroy data stored into the computer or gain financial benefits by sniffing passwords etc. To prevent these into the computer or gain financial benefits by sniffing passwords etc. To prevent these malicimalicious codes to enter to your system, a special program called an antious codes to enter to your system, a special program called an anti--virus is used virus is used which is designed to protect the system against virus. It not only prevents the malicious which is designed to protect the system against virus. It not only prevents the malicious code to enter the system but also detects and destroys the malicious code that is alcode to enter the system but also detects and destroys the malicious code that is already ready installed into the system. There are installed into the system. There are manymany new viruses coming every day. The antivirus new viruses coming every day. The antivirus program regularly updates its database and provides immunity to the system against these program regularly updates its database and provides immunity to the system against these new viruses, worms, etc.new viruses, worms, etc.
1.3.4
1.3.4 FirewallFirewall
It is a hardware/
It is a hardware/software, whichsoftware, which acts as a shield between an organizationacts as a shield between an organization’’s network and the s network and the internet and protects it from the threats like virus, malware, hackers, etc. It can be used to internet and protects it from the threats like virus, malware, hackers, etc. It can be used to limit the persons who can have access to your network and send information to you.limit the persons who can have access to your network and send information to you. There There are two typeare two types of traffic in an organization inbound traffic and outbound traffic. s of traffic in an organization inbound traffic and outbound traffic.
Figure 3: Different antivirus available on the market
Using firewall, it is possible to configure and mo
Using firewall, it is possible to configure and monitor the traffic of the ports (nitor the traffic of the ports (A port is a A port is a virtual point where network connections start and end. Ports are softwarevirtual point where network connections start and end. Ports are software--based and based and managed by a computer's operating system. Each port is associated with a specific process managed by a computer's operating system. Each port is associated with a specific process or service. Ports allow computers to easily differentiate between different kinds of traffic: or service. Ports allow computers to easily differentiate between different kinds of traffic: emails go to a different port than webpages, for instance, even though bemails go to a different port than webpages, for instance, even though both reach a oth reach a computer over the same Internet connection.computer over the same Internet connection.))
Examples:
Examples:

 Ports 20 and 21: File Transfer Protocol (FTP). FTP is for transferring files between a client and a server.

 Port 25: Historically, Simple Mail Transfer Protocol (SMTP). SMTP is used for email.

 Port 80: Hypertext Transfer Protocol (HTTP). HTTP is the protocol that makes the World Wide Web possible.
Only the packets from trusted
Only the packets from trusted ssource address can enter the organizationource address can enter the organization’’s network and the s network and the sources, which are blacklisted and sources, which are blacklisted and unauthorized address,unauthorized address, are denied access to the network. are denied access to the network. It is important to have firewalls to prevent the network from unauthorized access, but It is important to have firewalls to prevent the network from unauthorized access, but firewall does not guarantee this until and unless it is configured correctly. A firewall can firewall does not guarantee this until and unless it is configured correctly. A firewall can be implemented usingbe implemented using hardware as well as software or the combination of both.hardware as well as software or the combination of both.
Figure 4: Firewall
Hardware Firewalls
Hardware Firewalls: example of hardware firewalls are routers through which the : example of hardware firewalls are routers through which the network is connected to the network outside the organization i.e. network is connected to the network outside the organization i.e. InternetInternet. .
Software Firewalls:
Software Firewalls: These firThese firewewalls are installed andalls are installed and on the server and client machines on the server and client machines and it acts as a gaand it acts as a gateway to the organizationsteway to the organizations network. network.
1.3.5
1.3.5 SteganographySteganography
It is a technique of hiding secret messages in a document file, image file, and program or
It is a technique of hiding secret messages in a document file, image file, and program or protocol etc. such that the protocol etc. such that the embedded message is invisible and can be retrieved using special embedded message is invisible and can be retrieved using special software. Only the sender and the receiver know about the existence of the secret message software. Only the sender and the receiver know about the existence of the secret message in the image. The advantage of this technique is that these files are not easily suspectedin the image. The advantage of this technique is that these files are not easily suspected. . There areThere are many applications of many applications of steganography, whichsteganography, which includes sending secret messages includes sending secret messages without ringing the alarms, preventing secret files from unauthorized and accidental access without ringing the alarms, preventing secret files from unauthorized and accidental access and and theft,theft, digital watermarks for IPR issues, etc.digital watermarks for IPR issues, etc.
1.4 Access Control and Identity Management
1.4 Access Control and Identity Management
Fundamentally, access refers to the ability of a subject and an object to interact. That
Fundamentally, access refers to the ability of a subject and an object to interact. That interaction is the basis of everything we do, both in the information technology (IT) field interaction is the basis of everything we do, both in the information technology (IT) field and in life in general. Access and in life in general. Access can be defined in terms of social rules, physical barriers, or can be defined in terms of social rules, physical barriers, or informational restrictions.informational restrictions.
Access control
Access control is the formalization of those rules for allowing or denying access. Access is the formalization of those rules for allowing or denying access. Access controls define the allowable interactions between subjects and objects. Itcontrols define the allowable interactions between subjects and objects. It is based on the is based on the granting of rights, or privileges, to a subject with respect to an object.granting of rights, or privileges, to a subject with respect to an object.
Access control implements a security policy that specifies who or what (e.g. process may
Access control implements a security policy that specifies who or what (e.g. process may have access to each specific system resource and the type of access that ishave access to each specific system resource and the type of access that is permitted in each permitted in each instance.instance. The purpose of access control is to provide quick, convenient access control for The purpose of access control is to provide quick, convenient access control for authorized persons, while at the same time, restricting access for unauthorized people.authorized persons, while at the same time, restricting access for unauthorized people.
In general, access c
In general, access control involves:ontrol involves:

 Preventing Preventing unauthorized users from gaining access to resources (deals more with unauthorized users from gaining access to resources (deals more with authentication)authentication)

 Preventing legalPreventing legal users from accessing resources in an unauthorized mannerusers from accessing resources in an unauthorized manner

 Enabling Enabling legallegal users to access resources in an authorized manner.users to access resources in an authorized manner.
Access control deals with
Access control deals with subjects, objects and access rights as shown on the following subjects, objects and access rights as shown on the following figure:figure:
Organizations rely upon access controls to grant and restrict user access to information,
Organizations rely upon access controls to grant and restrict user access to information, systems, and other resources. Access control systems, when properly systems, and other resources. Access control systems, when properly designed;designed; implement implement business rules and business rules and oftenoften--directdirect implementations of policy in such a manner thaimplementations of policy in such a manner that individuals t individuals have access to the information and resources needed to perform their responsibilities but have access to the information and resources needed to perform their responsibilities but no more.no more.
Identity management
Identity management is the process of creating, maintaining, and is the process of creating, maintaining, and removingremoving user accounts user accounts and providing the mechanisms used to authenticate usersand providing the mechanisms used to authenticate users. Theoretically, identity . Theoretically, identity management allows you to confirm that a person is who they claim to be (authentication), management allows you to confirm that a person is who they claim to be (authentication), and access control allows you to restrict his or her activities to authorized actions and access control allows you to restrict his or her activities to authorized actions (authorization). (authorization).
Figure 5: Access Control Example
In practice, the concepts of identity
In practice, the concepts of identity management and access control are interwoven and are management and access control are interwoven and are difficult to separate. For this reason, many people refer to both fields together as identity difficult to separate. For this reason, many people refer to both fields together as identity and access management (IAM).and access management (IAM).
1.4.1 Principal Components of Access Control
1.4.1 Principal Components of Access Control
There are three principal components of any access control scenario:
There are three principal components of any access control scenario:

 PoliciesPolicies——The rules that govern who get access to which resourcesThe rules that govern who get access to which resources

 SubjectsSubjects——The user, network, process, or application requesting access to a resourceThe user, network, process, or application requesting access to a resource

 ObjectsObjects——The resource to which the The resource to which the subject desires access (e.g., files, databases, subject desires access (e.g., files, databases, printers, and physical facilities)printers, and physical facilities)
Any time you have to decide whether to allow or deny access by a subject to a resource,
Any time you have to decide whether to allow or deny access by a subject to a resource, you have entered the access control problem domain.you have entered the access control problem domain.
Access Control Systems
Access Control Systems
A well
A well--defdefined access control system consists of three elements:ined access control system consists of three elements:

 PoliciesPolicies: Clear statements of the business requirements regarding access to resources: Clear statements of the business requirements regarding access to resources

 ProceduresProcedures: Nontechnical methods, such as business processes and background : Nontechnical methods, such as business processes and background checks, used to enforce policieschecks, used to enforce policies

 ToolsTools:: Technical methods, such as file system access controls and network firewalls, Technical methods, such as file system access controls and network firewalls, used to enforce policiesused to enforce policies..
Access Control Subjects
Access Control Subjects
The subject in an access
The subject in an access--control scenario is a person or another application requesting control scenario is a person or another application requesting access to a resource such as the network, a file system, or a printer. There are three types access to a resource such as the network, a file system, or a printer. There are three types of subjects when it comes to access control for a specific resource: of subjects when it comes to access control for a specific resource:

 AuthoAuthorizedrized: Those who have presented authenticated credentials and have been : Those who have presented authenticated credentials and have been approved for access to the resource approved for access to the resource

 UnauthorizedUnauthorized: Those who have presented authenticated credentials but are not : Those who have presented authenticated credentials but are not approved for access to the resource approved for access to the resource

 UnknownUnknown: Those who have not prese: Those who have not presented authenticated credentialsnted authenticated credentials
Every individual who initially approaches an access control system is unknown until he or
Every individual who initially approaches an access control system is unknown until he or she attempts to authenticate. For example, someone might be asked to provide a username she attempts to authenticate. For example, someone might be asked to provide a username and password. If the user does not provide theand password. If the user does not provide the correct password, the system still does not correct password, the system still does not know who the user is and he or she remains unknown status. On the other hand, if the userknow who the user is and he or she remains unknown status. On the other hand, if the user’’s s password is correct, the system now knows with certainty who the user is and must check password is correct, the system now knows with certainty who the user is and must check to see if the user is authorizeto see if the user is authorized to access the requested resource. Someone allowed to access d to access the requested resource. Someone allowed to access the resource moves to the the resource moves to the ““authorizedauthorized” ” state. Otherwise, the user is still known, but now state. Otherwise, the user is still known, but now moves to the moves to the ““unauthorizedunauthorized” ” state.state.
This process is known as AAA (or
This process is known as AAA (or ““triple Atriple A”) ”) security and involves thsecurity and involves three components:ree components:

 Authentication: Ensuring users are who they claim to be Authentication: Ensuring users are who they claim to be

 Authorization: Ensuring that an authenticated user is allowed to perform the requested Authorization: Ensuring that an authenticated user is allowed to perform the requested action action

 Accounting: Maintaining records of the actions performed by authorized usersAccounting: Maintaining records of the actions performed by authorized users
Access
Access Control ObjectsControl Objects
There are three main categories of objects to be protected by access controls:
There are three main categories of objects to be protected by access controls:

 InformationInformation——Any type of data asset Any type of data asset

 TechnologyTechnology——Applications, systems, and networks Applications, systems, and networks

 Physical locationPhysical location——Physical locations such as buildings and roomsPhysical locations such as buildings and rooms
1.5
1.5 Types of CyberTypes of Cyber securitysecurity
1.5.1
1.5.1 Network SecurityNetwork Security Focuses on securing computer networks from unauthorized access, data breaches, and other network-based threats. It involves technologies such as Firewalls, Intrusion detection systems (IDS), Virtual private networks (VPNs). Guard your internal network against outside threats with increased network security.  Sometimes we used to utilize free Wi-Fi in public areas such as cafes, Malls, etc. With this activity, third Party starts tracking your Phone over the internet. If you are using any payment gateway, then your bank account can be Empty.  So, avoid using Free Network because free network does not support Securities.
1.5.2
1.5.2 Application SecurityApplication Security
Concerned with securing software applications and preventing vulnerabilities that could be exploited by attackers. It involves secure coding practices, regular software updates and patches, and application-level firewalls.
Most of the Apps that we use on our Cell phone are Secured and work under the rules and regulations of the Google Play Store. There are 3.553 million applications in Google Play; Apple App Store has 1.642 million, while Amazon App Store has 483 million available for users to download. When we have other choices, this does not mean that all apps are safe.
1.5.3
1.5.3 Information or Data SecurityInformation or Data Security
Focuses on protecting sensitive information from unauthorized access, disclosure, alteration, or destruction. It includes Encryption, Access controls, Data classification, and Data loss prevention (DLP) measures. Incident response refers to the process of detecting, analysing, and responding to security incidents promptly. Promoting security awareness among users is essential for maintaining information security.
It involves educating individuals about common security risks, best practices for handling sensitive information, and how to identify and respond to potential threats like phishing attacks or social engineering attempts. Encryption is the process of converting information into an unreadable format to protect it from unauthorized access. 1.5.4 Endpoint Security Refers to securing individual devices such as computers, laptops, smartphones, and IoT devices. It includes antivirus software, intrusion prevention systems (IPS), device encryption, and regular software updates.  Antivirus and Anti-malware software that scans and detects malicious software, such as Viruses, Worms, Trojans, and Ransomware. These tools identify and eliminate or quarantine malicious files, protecting the endpoint and the network from potential harm.  Firewalls are essential components of endpoint security. They monitor and control incoming and outgoing network traffic, filtering out potentially malicious data packets.  Keeping software and operating systems up to date with the latest security patches and updates is crucial for endpoint security. 1.5.5 Mobile Security It involves securing the organizational and personal data stored on mobile devices such as cell phones, tablets, and other similar devices against various malicious threats. These threats are unauthorized access, Device loss or Theft, Malware, etc.  Mobile is the very common device for day-to-day work. Everything we access and do are from mobile phone. Ex- Online class, Personal Calls, Online Banking, UPI Payments, etc.  Regularly backing up mobile device data is important to prevent data loss in case of theft, damage, or device failure.
References
1
1-- Hussaini Hussaini Mamman, A survey of biometric approaches of Mamman, A survey of biometric approaches of authentication, International Journal of Advanced Computer authentication, International Journal of Advanced Computer Research, Vol 10(47) ISSN (Print): 2249Research, Vol 10(47) ISSN (Print): 2249--7277 ISSN (Online): 22777277 ISSN (Online): 2277--7970.7970.
2
2-- S.Rajarajeswari and Ms.A.Maria StellaS.Rajarajeswari and Ms.A.Maria Stella,, A review of authentication A review of authentication and authorizatioand authorization methods,n methods, International Journal of Computer Science International Journal of Computer Science and Information Technology Research,and Information Technology Research, Vol. 7, Issue 3, Vol. 7, Issue 3, pp.pp.: (78: (78--83), 83), Month: July Month: July -- September 2019, Available at: September 2019, Available at: www.researchpublish.comwww.researchpublish.com
3
3-- Jeetendra Pande,Jeetendra Pande, Introduction to Cyber Security,Uttarakhand Open Introduction to Cyber Security,Uttarakhand Open University, 2017University, 2017
4
4-- IBM GBS North America Transformation OfficeIBM GBS North America Transformation Office,,Introduction to Introduction to CyberCyber securitysecurity
5
5-- Introduction to Access Control Systems Introduction to Access Control Systems
6
6-- Lecture Notes: Introduction to CyberLecture Notes: Introduction to Cyber securitysecurity
7
7-- Introduction to Cyber security, Cyber security Legal and Ethical Introduction to Cyber security, Cyber security Legal and Ethical Issues, Issues, Education and Careers and SummaryEducation and Careers and Summary
8
8-- Natarajan Meghanathan, Natarajan Meghanathan, Module 4: Access ControlModule 4: Access Control,, Jackson State Jackson State University, Jackson.University, Jackson.
9
9-- The Need for Access Control Systems and Identity ManagementThe Need for Access Control Systems and Identity Management,, fandijki/fandijki/Shutter StockShutter Stock, Inc, Inc
10
10-- https://www.geeksforgeeks.org/cyberhttps://www.geeksforgeeks.org/cyber--securitysecurity--typestypes--andand--importance/?ref=lbpimportance/?ref=lbp


تلخيص النصوص العربية والإنجليزية أونلاين

تلخيص النصوص آلياً

تلخيص النصوص العربية والإنجليزية اليا باستخدام الخوارزميات الإحصائية وترتيب وأهمية الجمل في النص

تحميل التلخيص

يمكنك تحميل ناتج التلخيص بأكثر من صيغة متوفرة مثل PDF أو ملفات Word أو حتي نصوص عادية

رابط دائم

يمكنك مشاركة رابط التلخيص بسهولة حيث يحتفظ الموقع بالتلخيص لإمكانية الإطلاع عليه في أي وقت ومن أي جهاز ماعدا الملخصات الخاصة

مميزات أخري

نعمل علي العديد من الإضافات والمميزات لتسهيل عملية التلخيص وتحسينها


آخر التلخيصات

لقد حقق القسم إ...

لقد حقق القسم إنجازات متعددة تعكس دوره المحوري في مواجهة تحديات التغيرات المناخية في القطاع الزراعي....

1. قوة عمليات ا...

1. قوة عمليات الاندماج والاستحواذ المالية في المشهد الديناميكي للأعمال الحديثة، ظهرت عمليات الاندماج...

اﻷول: اﻟﺒﺤﺚ ﻋﻠﻰ...

اﻷول: اﻟﺒﺤﺚ ﻋﻠﻰ ﺗﺸﺘﻤﻞ ﺗﻤﮭﯿﺪﯾﺔ ﻣﻘﺪﻣﮫ ﺳﻨﻀﻊ اﻟﻤﺒﺤﺚ ھﺬا ﻓﻲ ﺳﺘﻜﻮن ﺧﻼﻟﮭﺎ ﻣﻦ واﻟﺘﻲ اﻟﻌﻼﻗﺔ ذﻟﺒﻌﺾ ھﺎﻌﻠﻮم ﻔﺎت ...

الوصول إلى المح...

الوصول إلى المحتوى والموارد التعليمية: تشكل منصات وسائل التواصل الاجتماعي بوابة للدخول إلى المحتوى ...

ـ أعداد التقاري...

ـ أعداد التقارير الخاصه بالمبيعات و المصاريف والتخفيضات و تسجيل الايرادات و المشتريات لنقاط البيع...

وهي من أهم مستح...

وهي من أهم مستحدثات تقنيات التعليم التي واكبت التعليم الإلكتروني ، والتعليم عن والوسائط المتعدد Mult...

كشفت مصادر أمني...

كشفت مصادر أمنية مطلعة، اليوم الخميس، عن قيام ميليشيا الحوثي الإرهابية بتشديد الإجراءات الأمنية والر...

أولاً، حول إشعي...

أولاً، حول إشعياء ٧:١٤: تقول الآية: > "ها إن العذراء تحبل وتلد ابنًا، وتدعو اسمه عمانوئيل" (إشعياء...

يفهم الجبائي ال...

يفهم الجبائي النظم بأنّه: الطريقة العامة للكتابة في جنس من الأجناس الأدبية كالشعر والخطابة مثلاً، فط...

أعلن جماعة الحو...

أعلن جماعة الحوثي في اليمن، اليوم الخميس، عن استهداف مطار بن غوريون في تل أبيب بصاروخ باليستي من نوع...

اهتم عدد كبير م...

اهتم عدد كبير من المفكرين والباحثين في الشرق والغرب بالدعوة إلى إثراء علم الاجتماع وميادينه، واستخدا...

وبهذا يمكن القو...

وبهذا يمكن القول في هذه المقدمة إن مصطلح "الخطاب" يعدُّ مصطلحًا ذا جذور عميقة في الدراسات الأدبية، ح...