The process of identifying an individual usually based on a username and password. In security
systems, authentication is distinct from authorization, which is the process of giving
individuals access to system objects based on the
1. Access control
The access control is a security service and is used to manage the access to the resources (ex
data, process and devices) from a computer system, making the actions or operations of a valid
user may execute limited.
2. Active Threa
1. Alert protocol
The Common Alerting Protocol (CAP) is an XML-based data format for exchanging public
warnings and emergencies between alerting technologies. CAP allows a warning message to be
consistently disseminated simultaneously over many warn
Backdoor (computing), a hidden method for bypassing normal computer authentication systems.
Any mechanism that bypasses a normal security check; it may allow unauthorized access to
2. Behavior-Blocking Software
1. Detached Signature
A detached signature is a type of digital signature that is kept separate from its signed data, as
opposed to bundle together into a single file.
2. Domain Keys Identified Mail(DKIM)
DKIM is a specification used by e-mail provi
1. 4-way Handshake
The authentication process leaves two considerations: the access point (AP) still needs to
authenticate itself to the client station (STA), and keys to encrypt the traffic need to be derived.
The earlier EAP exchange or WPA2-PSK h
1. Application-Level Gateway
In the context of computer networking, an application-level gateway (also known as ALG or
application layer gateway) consists of a security component that augments a firewall or NAT
employed in a computer network.
CS 545 (Network Security)
Instructor: Professor. N. Bhatnagar
Name: Gayatry Ridhima Penumathsa
Stu Id: A2875
1. Authenticated Encryption
Authenticated Encryption (AE) is a block cipher mode of operation which simultaneously
1. Advanced Encryption Standard (AES)
It is a symmetric 128-bit block data encryption technique developed by Belgian cryptographers
Joan Daemen and Vincent Rijmen. The U.S government adopted the algorithm as its encryption
technique in October 2000,
1. Anti-Replay Service
Anti-replay is a sub protocol of IPsec that is part of Internet Engineering Task Force (IETF). The
main goal of anti-replay is to avoid hackers injecting or making changes in packets that travel
from a source to a destination.
1. Audit Record
A fundamental tool for intrusion detection is the audit record. Some record of ongoing activity by
users must be maintained as input to an intrusion detection system.
2. Bayes Theorem
In probability theory and statistics, Bayes' theo
Identificaton of leaked data in firms
We study the following problem: A data distributor has given sensitive
data to a set of supposedly trusted agents (third parties). Some of the data is
leaked and found in an unauthorized pla