Task 1 Security
Task 1 Security
Security concepts
AUTHORIZATION
▪ Authorization refers to the process of determining what actions or resources a user is
permitted to access within a system or application
Importance :
▪ Prevent unauthorized access to sensitive data or resources
Key Components :
▪ Access control policies
▪ Authentication
▪ Permissions
▪ Authorization Mechanisms
AUTHENTICATION
▪ Definition : Authentication is the process of verifying the identity of a user or system, ensuring
that they are who they claim to be.
▪ Importance : Crucial in maintaining security and protecting sensitive information from
unauthorized access.
TYPES:
▪ Password-based: Relies on a secret password known only to the user.
▪ Biometric: Uses physical characteristics like fingerprints or facial features for identification.
▪ Multi-factor: Requires multiple forms of authentication ,such as a password combined with a
fingerprint scan or a security token.
▪ Example: Logging into an email account using a combination of a password and a verification
code sent to a mobile device.
▪ Takeaway: Strong authentication mechanisms are essential for safeguarding digital assets and
preventing unauthorized access.
ENCRYPTION
▪ It works by scrambling data into an unreadable format, called ciphertext, accessible only
to those with the decryption key. This ensures confidentiality, integrity, and authenticity of
data, protecting it from unauthorized access, alteration, or denial.
▪ Symmetric Encryption: AES (Advanced Encryption Standard), Twofish
▪ Asymmetric Encryption:RSA, Elliptic Curve Cryptography (ECC)
▪ Advantages:Enhanced data security and privacy. Ensures data integrity and prevents
alterations.
▪ Supports digital transformation initiatives. Facilitates compliance with regulations.
▪ Disadvantages:Ransomware risk, Key management challenges, Quantum computing
threat.
▪ Importance of Data Encryption:Protects Personal Privacy, Secures Financial Transactions,
Maintains Website Security, Combats Cyber Threats.
CYBER SECURITY CURRENT TRENDS
• Ransomware attacks
• Cloud Security
• Artificial Intelligence and Machine Learning
• IoT
• Identity & Access Management
• Remote Work security