SlideShare a Scribd company logo
1 of 2
Download to read offline
4. Define communication security, information security, network security, physical security with
example.
Solution
Communication Security
The protection resulting from all measures designed to deny unauthorized persons information of
value that might be derived from the possession and study of telecommunications, or to mislead
unauthorized persons in their interpretation of the results of such possession and study. Also
called COMSEC. Communications security includes: cryptosecurity, transmission security,
emission security, and physical security of communications security materials and information.
a. cryptosecurity--The component of communications security that results from the provision of
technically sound cryptosystems and their proper use. b. transmission security--The component
of communications security that results from all measures designed to protect transmissions from
interception and exploitation by means other than cryptanalysis. c. emission security--The
component of communications security that results from all measures taken to deny unauthorized
persons information of value that might be derived from intercept and analysis of compromising
emanations from crypto-equipment and telecommunications systems. d. physical security--The
component of communications security that results from all physical measures necessary to
safeguard classified equipment, material, and documents from access thereto or observation
thereof by unauthorized persons.
Physical Security
Physical security is the protection of personnel, hardware, software, networks and data from
physical actions and events that could cause serious loss or damage to an enterprise, agency or
institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism
and terrorism.
Physical security has three important components: access control, surveillance and testing.
Obstacles should be placed in the way of potential attackers and physical sites should be
hardened against accidents, attacks or environmental disasters. Such hardening measures include
fencing, locks, access control cards, biometric access control systems and fire suppression
systems. Second, physical locations should be monitored using surveillance cameras and
notification systems, such as intrusion detection sensors, heat sensors and smoke detectors.
Third, disaster recovery policies and procedures should be tested on a regular basis to ensure
safety and to reduce the time it takes to recover from disruptive man-made or natural disasters.
Information Security
Information security (infosec) is a set of strategies for managing the processes, tools and policies
necessary to prevent, detect, document and counter threats to digital and non-digital information.
Infosec responsibilities include establishing a set of business processes that will protect
information assets regardless of how the information is formatted or whether it is in transit, is
being processed or is at rest in storage.
Infosec programs are built around the core objectives of the CIA triad: maintaining the
confidentiality, integrity and availability of IT systems and business data. These objectives
ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent
unauthorized modification of data (integrity) and guarantee the data can be accessed by
authorized parties when requested (availability).
Threats to sensitive and private information come in many different forms, such as malware and
phishing attacks, identity theft and ransomware. To deter attackers and mitigate vulnerabilities at
various points, multiple security controls are implemented and coordinated as part of a layered
defense in depth strategy. This should minimize the impact of an attack. To be prepared for a
security breach, security groups should have an incident response plan (IRP) in place. This
should allow them to contain and limit the damage, remove the cause and apply updated defense
controls.
Network Security
A specialized field in computer networking that involves securing a computer network
infrastructure. Network security is typically handled by a network administrator or system
administrator who implements the security policy, network software and hardware needed to
protect a network and the resources accessed through the network from unauthorized access and
also ensure that employees have adequate access to the network and resources to work.
A network security system typically relies on layers of protection and consists of multiple
components including networking monitoring and security software in addition to hardware and
appliances. All components work together to increase the overall security of the computer
network.

More Related Content

Similar to 4. Define communication security, information security, network secu.pdf

Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & CyberPaul Andrews
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdfpublicchats
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdfFahadZaman38
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................MuhammadKhalil858111
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1Temesgen Berhanu
 
Nw sec
Nw secNw sec
Nw secshivz3
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxTikdiPatel
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdfZahid Hussain
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Computing safety
Computing safetyComputing safety
Computing safetytitoferrus
 

Similar to 4. Define communication security, information security, network secu.pdf (20)

computer security .ppt
computer security .pptcomputer security .ppt
computer security .ppt
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
what is cybersecurity.pdf
what is cybersecurity.pdfwhat is cybersecurity.pdf
what is cybersecurity.pdf
 
Concept Of Cyber Security.pdf
Concept Of Cyber Security.pdfConcept Of Cyber Security.pdf
Concept Of Cyber Security.pdf
 
network security.001.pptx................
network security.001.pptx................network security.001.pptx................
network security.001.pptx................
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Computer Security Chapter 1
Computer Security Chapter 1Computer Security Chapter 1
Computer Security Chapter 1
 
ch01-4.ppt
ch01-4.pptch01-4.ppt
ch01-4.ppt
 
Nw sec
Nw secNw sec
Nw sec
 
Cyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptxCyber-Security-Unit-1.pptx
Cyber-Security-Unit-1.pptx
 
Defense in Depth
Defense in DepthDefense in Depth
Defense in Depth
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdf
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Computing safety
Computing safetyComputing safety
Computing safety
 

More from arvindarora20042013

I need help answering these Summarize Madison’s central arguments i.pdf
I need help answering these Summarize Madison’s central arguments i.pdfI need help answering these Summarize Madison’s central arguments i.pdf
I need help answering these Summarize Madison’s central arguments i.pdfarvindarora20042013
 
if you want to conduct business in a country like somalia what are t.pdf
if you want to conduct business in a country like somalia what are t.pdfif you want to conduct business in a country like somalia what are t.pdf
if you want to conduct business in a country like somalia what are t.pdfarvindarora20042013
 
If the U.S. population is 305.5 Million and each person was to recei.pdf
If the U.S. population is 305.5 Million and each person was to recei.pdfIf the U.S. population is 305.5 Million and each person was to recei.pdf
If the U.S. population is 305.5 Million and each person was to recei.pdfarvindarora20042013
 
If national savings remain unchanged and net capital outflow falls, .pdf
If national savings remain unchanged and net capital outflow falls, .pdfIf national savings remain unchanged and net capital outflow falls, .pdf
If national savings remain unchanged and net capital outflow falls, .pdfarvindarora20042013
 
Identify the structures labeled in the following diagrams. Identify t.pdf
Identify the structures labeled in the following diagrams. Identify t.pdfIdentify the structures labeled in the following diagrams. Identify t.pdf
Identify the structures labeled in the following diagrams. Identify t.pdfarvindarora20042013
 
Darwins 4 postulates are basic rules for when a trait is likely to .pdf
Darwins 4 postulates are basic rules for when a trait is likely to .pdfDarwins 4 postulates are basic rules for when a trait is likely to .pdf
Darwins 4 postulates are basic rules for when a trait is likely to .pdfarvindarora20042013
 
Compare the grasshopper with the crayfish. Which characteristics mak.pdf
Compare the grasshopper with the crayfish. Which characteristics mak.pdfCompare the grasshopper with the crayfish. Which characteristics mak.pdf
Compare the grasshopper with the crayfish. Which characteristics mak.pdfarvindarora20042013
 
Bonus Problem 3 Some people argued that the U.S. stock market crash o.pdf
Bonus Problem 3 Some people argued that the U.S. stock market crash o.pdfBonus Problem 3 Some people argued that the U.S. stock market crash o.pdf
Bonus Problem 3 Some people argued that the U.S. stock market crash o.pdfarvindarora20042013
 
A positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdfA positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdfarvindarora20042013
 
Asse Place the following in chronological order as fluid flow Bloo.pdf
Asse  Place the following in chronological order as fluid flow  Bloo.pdfAsse  Place the following in chronological order as fluid flow  Bloo.pdf
Asse Place the following in chronological order as fluid flow Bloo.pdfarvindarora20042013
 
Add the binary number Convert the following unsigned hexadecimal num.pdf
Add the binary number  Convert the following unsigned hexadecimal num.pdfAdd the binary number  Convert the following unsigned hexadecimal num.pdf
Add the binary number Convert the following unsigned hexadecimal num.pdfarvindarora20042013
 
A wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdfA wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdfarvindarora20042013
 
A laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdfA laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdfarvindarora20042013
 
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdfarvindarora20042013
 
Which of the following types of viruses can infect both boot sectors.pdf
Which of the following types of viruses can infect both boot sectors.pdfWhich of the following types of viruses can infect both boot sectors.pdf
Which of the following types of viruses can infect both boot sectors.pdfarvindarora20042013
 
Which one is NOT typical of a ceramic material low melting point h.pdf
Which one is NOT typical of a ceramic material  low melting point  h.pdfWhich one is NOT typical of a ceramic material  low melting point  h.pdf
Which one is NOT typical of a ceramic material low melting point h.pdfarvindarora20042013
 
What ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdfWhat ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdfarvindarora20042013
 
What is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdfWhat is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdfarvindarora20042013
 
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdfarvindarora20042013
 
The vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdfThe vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdfarvindarora20042013
 

More from arvindarora20042013 (20)

I need help answering these Summarize Madison’s central arguments i.pdf
I need help answering these Summarize Madison’s central arguments i.pdfI need help answering these Summarize Madison’s central arguments i.pdf
I need help answering these Summarize Madison’s central arguments i.pdf
 
if you want to conduct business in a country like somalia what are t.pdf
if you want to conduct business in a country like somalia what are t.pdfif you want to conduct business in a country like somalia what are t.pdf
if you want to conduct business in a country like somalia what are t.pdf
 
If the U.S. population is 305.5 Million and each person was to recei.pdf
If the U.S. population is 305.5 Million and each person was to recei.pdfIf the U.S. population is 305.5 Million and each person was to recei.pdf
If the U.S. population is 305.5 Million and each person was to recei.pdf
 
If national savings remain unchanged and net capital outflow falls, .pdf
If national savings remain unchanged and net capital outflow falls, .pdfIf national savings remain unchanged and net capital outflow falls, .pdf
If national savings remain unchanged and net capital outflow falls, .pdf
 
Identify the structures labeled in the following diagrams. Identify t.pdf
Identify the structures labeled in the following diagrams. Identify t.pdfIdentify the structures labeled in the following diagrams. Identify t.pdf
Identify the structures labeled in the following diagrams. Identify t.pdf
 
Darwins 4 postulates are basic rules for when a trait is likely to .pdf
Darwins 4 postulates are basic rules for when a trait is likely to .pdfDarwins 4 postulates are basic rules for when a trait is likely to .pdf
Darwins 4 postulates are basic rules for when a trait is likely to .pdf
 
Compare the grasshopper with the crayfish. Which characteristics mak.pdf
Compare the grasshopper with the crayfish. Which characteristics mak.pdfCompare the grasshopper with the crayfish. Which characteristics mak.pdf
Compare the grasshopper with the crayfish. Which characteristics mak.pdf
 
Bonus Problem 3 Some people argued that the U.S. stock market crash o.pdf
Bonus Problem 3 Some people argued that the U.S. stock market crash o.pdfBonus Problem 3 Some people argued that the U.S. stock market crash o.pdf
Bonus Problem 3 Some people argued that the U.S. stock market crash o.pdf
 
A positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdfA positive relationship exists between two variables if one variable .pdf
A positive relationship exists between two variables if one variable .pdf
 
Asse Place the following in chronological order as fluid flow Bloo.pdf
Asse  Place the following in chronological order as fluid flow  Bloo.pdfAsse  Place the following in chronological order as fluid flow  Bloo.pdf
Asse Place the following in chronological order as fluid flow Bloo.pdf
 
Add the binary number Convert the following unsigned hexadecimal num.pdf
Add the binary number  Convert the following unsigned hexadecimal num.pdfAdd the binary number  Convert the following unsigned hexadecimal num.pdf
Add the binary number Convert the following unsigned hexadecimal num.pdf
 
A wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdfA wild-type chromosome has the following segments A B C middot D E F.pdf
A wild-type chromosome has the following segments A B C middot D E F.pdf
 
A laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdfA laser range finder was used to sense the obstacles. What parameter.pdf
A laser range finder was used to sense the obstacles. What parameter.pdf
 
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
5. Evaluate the following integral (t 2)cos Tut4)dt SolutionTh.pdf
 
Which of the following types of viruses can infect both boot sectors.pdf
Which of the following types of viruses can infect both boot sectors.pdfWhich of the following types of viruses can infect both boot sectors.pdf
Which of the following types of viruses can infect both boot sectors.pdf
 
Which one is NOT typical of a ceramic material low melting point h.pdf
Which one is NOT typical of a ceramic material  low melting point  h.pdfWhich one is NOT typical of a ceramic material  low melting point  h.pdf
Which one is NOT typical of a ceramic material low melting point h.pdf
 
What ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdfWhat ethical concerns do anthropologists confrontSolutionRace.pdf
What ethical concerns do anthropologists confrontSolutionRace.pdf
 
What is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdfWhat is the general location of the three different types of amino a.pdf
What is the general location of the three different types of amino a.pdf
 
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
3 Suppose V is finite-dimensional and v element of V with v is not eq.pdf
 
The vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdfThe vast majority of commenters envision a strong role for the FASB .pdf
The vast majority of commenters envision a strong role for the FASB .pdf
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

4. Define communication security, information security, network secu.pdf

  • 1. 4. Define communication security, information security, network security, physical security with example. Solution Communication Security The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications, or to mislead unauthorized persons in their interpretation of the results of such possession and study. Also called COMSEC. Communications security includes: cryptosecurity, transmission security, emission security, and physical security of communications security materials and information. a. cryptosecurity--The component of communications security that results from the provision of technically sound cryptosystems and their proper use. b. transmission security--The component of communications security that results from all measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis. c. emission security--The component of communications security that results from all measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of compromising emanations from crypto-equipment and telecommunications systems. d. physical security--The component of communications security that results from all physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons. Physical Security Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism. Physical security has three important components: access control, surveillance and testing. Obstacles should be placed in the way of potential attackers and physical sites should be hardened against accidents, attacks or environmental disasters. Such hardening measures include fencing, locks, access control cards, biometric access control systems and fire suppression systems. Second, physical locations should be monitored using surveillance cameras and notification systems, such as intrusion detection sensors, heat sensors and smoke detectors. Third, disaster recovery policies and procedures should be tested on a regular basis to ensure safety and to reduce the time it takes to recover from disruptive man-made or natural disasters. Information Security
  • 2. Information security (infosec) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage. Infosec programs are built around the core objectives of the CIA triad: maintaining the confidentiality, integrity and availability of IT systems and business data. These objectives ensure that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability). Threats to sensitive and private information come in many different forms, such as malware and phishing attacks, identity theft and ransomware. To deter attackers and mitigate vulnerabilities at various points, multiple security controls are implemented and coordinated as part of a layered defense in depth strategy. This should minimize the impact of an attack. To be prepared for a security breach, security groups should have an incident response plan (IRP) in place. This should allow them to contain and limit the damage, remove the cause and apply updated defense controls. Network Security A specialized field in computer networking that involves securing a computer network infrastructure. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work. A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network.