In general, the security policy refers to:
1. Access control:
2. Management and
- Authorizing interaction between users and protected information.
- Administration (creation,
maintenance and deletion of users as well as their rights);
Technologies for audit, monitoring, and warning:
- Report on the activity of
- Monitoring of the whole
Intrusion Protection Systems:
- Automatic notification of
an unusual or predetermined event.
- To prevent, detect and /
or correct the signature of all the type of viruses as well as their effects.
in the system, through hardware and software mechanisms.
- Non-repudiation of the sender
Technologies for encryption key management:
- To ensure the encryption support and the digital signature regarding:
Technologies for increasing user authentication:
- In addition to the usual
identification of users by account and password, the existence of hard devices
- Scanning the network to
detect security attacks;
Security at the physical level:
- Identification of
incidents caused by intruders.
- Securing physical access
to computers as such.
- For services with the
purpose of establishing a security policy;
It is noted that
an important component in ensuring the protection of the systems is represented
by encryption technologies, which ensure the confidentiality, integrity,
non-repudiation of the sender of information in the system, by hardware and
software mechanisms, as well as technologies for the management of the
encryption keys to ensure the support. encryption and digital signature for
generating, issuing, revoking, and destroying encryption keys.
- To design, select,
implement, establish or monitor a security environment.
on public and private keys can be used to control access to data. Encrypted
products are accessible to everyone, but the decryption is possible only to those
who hold the right key. Techniques based on encryption/decryption must handle
large amounts of digital data and must also be obtained in real-time - for
example for video and TV communications.
are based on cryptographic algorithms and have been proposed to verify the
authenticity of short digital messages. Using the private key, the original
creator produces a digital signature for each product. A public verification
algorithm analyzes the content of the product and obtains the appropriate
signature. Applying these signatures on digital, video, or audio images has
proven to be inconvenient and impractical due to the large size of the
signature that is attached to the original data. Hash functions are used to
solve these problems.
Last modified: Wednesday, 5 May 2021, 3:58 PM