answersLogoWhite

0


Best Answer

The process to implement the security properties is known as security mechanism. The various type of mechanism on the basis of properties is as follows:


  • Attack Prevention
  • Attack Avoidance
  • Attack Detection

Attack Prevention: can be defined as a series of security mechanism implemented to prevent or defend against various types of attack before they can actually reach and affect the target systems. An important mechanism is access control which is defined as the process of limiting the access to the resources of the Information System. Access can be implemented at different levels such as the operating system the network and the application layer.

A firewall is also an important access control system that is implemented at the network layer the concept behind firewall is to separate the trusted network from the entrusted network known as internet. The firewall prevents the attack from the outside world against the machines inside the internal network by preventing connection s attempts from the unauthorized entities located outside.

Attack Avoidance: The expansion of connectivity of computers makes the need of protecting the message and message from tampering reading important. This is the technique in which the information is modified in a way that makes is unusable for the attacker. This is performed under the assumption that the attacker may have access to the subject system/information. The sender preprocess the information before it is send through the unsecured system and the same is again post processed on the receiver end systems. This encryption and decryption is perfumed by cryptography mechanism, they are further divided in the following forms:


  • Secret Key Cryptography
  • Public Key Cryptography
  • Hash Functions

Attack Detection: In this mechanism it is assumed that the attacker is able to bypass the installed security measures to access the desired target/information. When such incidents happens attack detection takes the responsibility to report someone that something went wrong somewhere in the system.

Attack detection is not an applicable mechanism instead of that it's a check/measure which will make sure that if anything happened badly in the system then someone should be notified for the same.

User Avatar

Wiki User

8y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are different security mechanism in network security?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the relationship between security attacks and security services and security mechanisms in network security?

Security attack--any action that compromises the security of information (In simple terms, attempted to cause damage)Security Mechanism-- It is a mechanism that is designed todetectpreventrecoverfrom security attackSecurity Service--makes use of one or more security mechanism


Is the network security key is the wifi's password?

In general, yes. The WiFi password is a network security key. There are some special systems, however, which require a different network security key to access the internet, sometimes even if you have a wired connection.


Difference between network and operating system security?

Network security concentrates on the packets of information flowing between computer systems.Operating System security controls access to resources on the server itself.Therefore, the two are looking at different things in terms of security.


What is the difference between a network operating system and operating system security?

Network security concentrates on the packets of information flowing between computer systems.Operating System security controls access to resources on the server itself.Therefore, the two are looking at different things in terms of security.


What are different security mechanisms in network security?

The process to implement the security properties is known as security mechanism. The various type of mechanism on the basis of properties is as follows:Attack PreventionAttack AvoidanceAttack DetectionAttack Prevention: can be defined as a series of security mechanism implemented to prevent or defend against various types of attack before they can actually reach and affect the target systems. An important mechanism is access control which is defined as the process of limiting the access to the resources of the Information System. Access can be implemented at different levels such as the operating system the network and the application layer. A firewall is also an important access control system that is implemented at the network layer the concept behind firewall is to separate the trusted network from the entrusted network known as internet. The firewall prevents the attack from the outside world against the machines inside the internal network by preventing connection s attempts from the unauthorized entities located outside.Attack Avoidance: The expansion of connectivity of computers makes the need of protecting the message and message from tampering reading important. This is the technique in which the information is modified in a way that makes is unusable for the attacker. This is performed under the assumption that the attacker may have access to the subject system/information. The sender preprocess the information before it is send through the unsecured system and the same is again post processed on the receiver end systems. This encryption and decryption is perfumed by cryptography mechanism, they are further divided in the following forms:Secret Key CryptographyPublic Key CryptographyHash FunctionsAttack Detection: In this mechanism it is assumed that the attacker is able to bypass the installed security measures to access the desired target/information. When such incidents happens attack detection takes the responsibility to report someone that something went wrong somewhere in the system.Attack detection is not an applicable mechanism instead of that it's a check/measure which will make sure that if anything happened badly in the system then someone should be notified for the same.


What is another name for SecurID?

Another name for SecurlID is RSA SecurID. It is a mechanism developed by Security Dynamics for two factor authentication performing for a user to a network resource.


How is broadband access different from the network you use at work?

Corporate and government networks are typically protected by many layers of security, ranging from network firewalls to encryption. In addition, they usually have support staff who maintain the security and availability of these network connections.


When was Network Security Toolkit created?

Network Security Toolkit was created in 2003.


When was TriGeo Network Security created?

TriGeo Network Security was created in 2001.


When was Tenable Network Security created?

Tenable Network Security was created in 2002.


What security measures can be used to protect one's WiFi network?

To protect one's WiFi network, there are a number of different security measures to take. The easiest and most common of these is to set up a password so that the network cannot be accessed by unwanted guests.


What is the difference between operating system security and network security?

operating system security concerns about vulnerabilities on specific operating system network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.