Security mechanisms in a computer system

Security mechanisms are strategies set by organisation to address issue of computer system security, these protocols are set by organisation so to prevent unauthorised access by to their private data and files.

Security mechanisms in a  computer system

Introduction  

Security mechanisms are strategies set by organisation to address issue of computer system security, these protocols are set by organisation so to prevent unauthorised access by to their private data and files.For success of an organisation it should implement  a good protocol of securing their data so to avoid their rivals from accessing confidential information. Below are some of security mechanisms

READ  ALSO: Hackers Steals Hundreds Of Millions Of iPhones Data Which Apple Can't Stop.

1.0 Encipherment it used to protect confidential data and also infromation flow. Encipherment can be done  through encryption techniques.

2.0 Digital signatures are used to provide analog signature to electronic system.So long as one need to access the system he/she should not forgot the signature. Incase user forgot to enter the exact signature the system will not open.

3.0 Access control mechanisms this senario of access control ensures that only authorised user can access the system. It is used to deter the unauthorised user since before login you need to give the system certain credentilas which incase they don't match the sytem would  allow to access the information.

READ ALSO: Type of hackers and common tools they use

4.0 Data integrity mechanism data integrity technique is used to protect the integrity of the data, it is used to ensure that data in transit is not tempered  with by hackers.

5.0 authentication mechanism systems are designed such that  it only authenticate user before allowing them to access the system.

6.0 Traffic padding used to prevent attack through traffic analysis traffic padding can be effective if they are protected well.

7.0 Routing control used to choose dynamically data routes on transit here communication systems are used to detect passive or active data attacks.

8.0 Notarization mechanisms used to ensure certain properties of data communicated between two or more entities such as origin,identity and destination of that data.

9.0 physical security this is achieved by ensuring computer systems are kept in a secure place, the place should be equipped with strong doors with indoor locks so to prevent intruder from physcically accessing the resources.

10.0 Auditing refers to process of recording and checking events to detect wether unauthorised activity has occured or an attempt 

READ ALSO: Types of computer viruses