what is Internet Security Concepts?. If You Find The Answer Of This Question Then This Article Is Definitely For You. In This Article We Will Discuss Internet Security Concepts. So Without Wasting Time Let’s Know About The what is Internet Security Concepts?
what is Internet Security Concepts?
When we use a computer system that is connected to the Internet we are able to access various web sites. A system that is connected to the Internet can be accessed by another system through the same protocol.
When we download any information or data from the Internet, our first objective is about the security of our computer system. The reason for concern about the system is that we do not want unauthorized person to use any information from our system.
Therefore, we need to be concerned about the security of other systems so that we can conduct business transactions or any other important behavior and get loyal information.
The methods of internet security are described below:
Authentication is the process of determining the identity of a user who is trying to access a system. For security purpose, verification of the identity of the person or process is necessary.
Therefore, authentication is the verification of a user’s identity claim by password, personal challenge, response calculator, or random password generator. Most security policies state that to access a network and its services, the user must enter a login ID and password that is authenticated by the security server.
If we want to increase security, then a one-time password can be used. With the one-time password system, the user’s password is always changed and no one can hack that password. This is often accomplished with safety
A security card is a physical device about the size of a credit card. The user entered a personal identification number (PIN) on the card. The card provides a time password theu are used to access the corporate network for a limited time.
Password is wisely a central security card server that resides on the network. Security cards are commonly used by telecom and mobile users. They are not commonly used for LAN access.
These are methods for a token-based user authentication system:
- One-time password system
- Response / Challenge System
- Packet Filter
- Authentication server
- Remote Authentication Dial-in User Service (RADIUS)
One-time password system:
The user token displays a “current password”, which the user enters in any context that requires a traditional password.
The server cyst can calculate the password on-demand and verify the authentication request. However, it is up to the authentication server to ensure that the password cannot be reused.
This means that every successful one-time password authentication requires an update operation for the authentication database.
Response / Challenge System
The user first gets a challenge posed by authentication. Server. The challenge is then copied by the user to his or her token. The token then computes and displays the response back to the application for authentication information.
The server system calculates the expected response and compares it with the user-submitted response. However, since challenges arise randomly from the server, attacks associated with republishing authentication information are not a problem for well-designed systems. As a result, the server is not required to retain the information about which the “password” has been used.
Password is the most common form of computer security. Some networks require multiple levels of passwords to access different servers or databases.
Passwords become weak links when they are shared among colleagues, stolen, written down or created in such a way that they can be easily guessed.
For example, users will try to create memorable passwords using their names or social security numbers.
Callback is a security feature that works like this: a user dials into a communications server and enters a username and password, communication then works.
The modem hangs up the connection to authenticate the user AU Searches its database, then calls the user back to a predetermined number. Callbacks provide good security to users who access remote networks from one location.
Packet filter allows network administrators to limit user access to specific services on the network. Packet filtering on the communications server analyzes each message sent from a remote client.
The filter can determine the computer service to the user who tries to access and deny access to that service.
The authentication server can be set up in a variety of ways, depending upon the security scheme of the network they are serving. the basic process for authenticating a user includes the following steps:
- A user dials into a network via the Communications Server or Network Access Server (NAS).
- NAS forwards user identification and password for authentication server.
- Then the authentication server validates the user and grants access privileges to the network.
Remote Authentication Dial-in User Service (RADIUS):
RADIUS is a system of distributed security that solves problems associated with meeting the security requirements of remote computing. The solution eliminates the need for specialized hardware and provides access to a variety of state-of-the-art solutions.
Distributed security separates user authentication and authorization from the communication process and creates a single central location for user authentication data. RADIUS is an independently distributed security system developed by Lucent Technologies.
RADIUS provides an open and scalable client-server security system. RADIUS can be easily adapted to work with third-party security products. RADIUS authenticates users through a series of communications between the client and the server. Once the user is authenticated, the customer grants that user access to the appropriate network services.
Authorization is the process of determining how an authenticated user is allowed to use unsafe resources. An authorization mechanism automatically implements a management policy using a resource application.
For example, in a computer system, resources typically include data files, operator commands, transactions, I / O devices, and program processes. Specific rules for authorizing access to a data object typically enforce confidentiality and integrity by erasing or denying access to read, modify or create data records, or to control the creation or deletion of data objects.
For communication networks, the resource object usually includes specific operator commands and routing destinations. Authorization rules for networks typically limit the available commands of each network operator to check status or start/stop devices in local and remote network domains.
While authentication controls that can use network resources, the authority states what they can do after accessing the resources. Authorization grants privileges to processes and users.
Authorization allows the security administrators to control parts of a network, e.g. Directory and file on the server. Authorization (also authorizing authority) is the act of specifying access rights to resources, which relate to information security and computer security in general and control in particular.
More formally, “authorizing” is to define an access policy. For example, human resources and employees are usually authorized to access employee records, and this policy is usually formalized as access control rules in a computer system.
During operation, the system uses access control rules to decide whether access requests from consumers (certified) are granted or rejected.
Resources include data on personal files or objects, the functionality provided by computer programs, computer devices, and computer applications. Examples of consumers are computer users, computer programs, and other devices on the computer.
This Is Our what is Internet Security Concepts? I Hope You Find Your Answer AboutInternet Security Concepts. If You Have Any Suggestions Or Questions Related To This Article, Then Definitely Tell In The Comment, We Will Reply To You As Soon As Possible.
Source: I&WT, Wikipedia
Our Suggested Article’s
ADVANTAGES AND DISADVANTAGES OF GADGETS IN OUR LIFE
What To Do If Mobile Is Stolen??
How To Choose Best Mobile Camera
How To Choose Best Processor For Mobile??
Best Top Ten Printers For Home & Office Use In 2020
How To Send Stickers In WhatsApp??
What Is Domain Name Servers?What Is Ip Address?? And Ip Address ClassesWhat Is A Modem? & Types Of ModemBest Wireless Earphones Under Rs 2000 -Tested & ReviewedConnecting To The Internet In Windows PcWhat Is Internet Definition And Evolution Of The Internet
Ten Best Bluetooth Earphones Under 1000 Rupees -Tested & ReviewedTen Best Wireless Mouse Under 1000 Rupees – Tested & ReviewedThe Best Mouse Under 500 Rupees – Tested And ReviewedBest Wireless Mouse Under 500 Rupees – Tested And Reviewed