Information Security Articles

Page 13 of 30

What are the techniques of Text Steganography in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 815 Views

Steganography is the art and science of concealing a message within another message without drawing some suspicion to others so that the message can only be identified by its intended recipient.There are various techniques of text steganography which are as follows −Line-shift coding − Features are marked into the text by changing the lines, so as to create recognition harder. Text lines are vertically changed for encoding. This can be used to either a format file or to the bitmap of a page.By transforming each second line of the document 1/300th of an inch up or down, line-shift encrypting provide ...

Read More

How does Steganography works in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 528 Views

Steganography is the art and science of connecting which hides the presence of the communication. The purpose of steganography is to convey a message to a receiver in such a method that the very presence of the message is indistinguishable by a third party.In the computer world, steganography means hiding secret messages in graphics, pictures, movie, or sound. At any cost, steganography secure from pirating copyrighted materials as well as aiding in unauthorized viewing.The advantage of steganography is to connect fast in an absolutely imperceptible aspect and to prevent drawing suspicion to the communication of a hidden record.Steganography hide the ...

Read More

What are the types of security mechanism in information security?

Ginni
Ginni
Updated on 11-Mar-2022 2K+ Views

There are various types of security mechanism which are as follows −Physical Security − Physical security define limiting access to key network resources by maintaining the resources behind a locked door and secured from natural and human-made disasters.Physical security can secure a network from unintended exploitation of network equipment by untrained faculty and contractors. It can also secure the network from hackers, competitors, and terrorists walking in off the street and changing equipment configurations.It is based on the level of protection, physical security can secure a network from terrorist and biohazard events, such as bombs, radioactive spills, etc. Physical security ...

Read More

What are True Random Number Generation?

Ginni
Ginni
Updated on 11-Mar-2022 4K+ Views

A true random number generator (TRNG) uses a nondeterministic source to make randomness. Most function by measuring unpredictable natural processes, including pulse detectors of ionizing radiation activities, gas discharge tubes, and leaky capacitors.Intel has developed a commercially accessible chip that samples thermal noise by developing the voltage measured across undriven resistors. TRNG generates a true random number and is produced generally by hardware method.Because the random number produced by TRNG is complex to predict because TRNG is generated based on a physical source that is complex to forecast a random value. Hence, the random number produced from TRNG is a ...

Read More

What are the principle of Symmetric Cipher in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 3K+ Views

A symmetric cipher is one that uses the similar key for encryption and decryption. The use of a symmetric cipher presents the well-known challenge of how to share the secret key between the parties fast, as an unauthorized party to the communication can prevent it and eavesdrop on future communication.There are various principles of Symmetric Cipher which are as follows −Plaintext − This is the authentic intelligible message or information that is full into the algorithm as input.Encryption algorithm − The encryption algorithm implements several substitutions and conversion on the plaintext.Secret key − The secret key is also input to ...

Read More

What is the comparison between Authentication and Authorization in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 675 Views

AuthenticationAuthentication is the procedure of providing that an individual is the person that they claim to be. This contains matching a person’s claimed identity asserted through a credential (such as an ID card or unique ID number) against one or more authentication factors that are destined to that credential.Authentication is about validating the credentials such as User Name/User ID and password to verify the identity. The system decides whether it can what it can say and it is using the credentials.In public and private networks, the system authenticates the user identity through login passwords. Authentication is usually completed by a ...

Read More

What is Authorization in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 4K+ Views

Authorization is the procedure of permitting someone to do something. It defines it an approach to check if the user has permission to need a resource or not. It can represent that what data and information one user can access.It is also called as AuthZ. The authorization generally works with authentication so that the system can understand who is accessing the information. Authorization is a security structure used to decide user/client privileges or access levels associated with system resources, such as computer programs, files, services, data and application features.Authorization is generally preceded by authentication for customer identity verification. System administrators ...

Read More

What are the types of Cryptosystems in information security?

Ginni
Ginni
Updated on 11-Mar-2022 450 Views

There are various types of cryptosystem which are as follows −Private Key cryptosystems − Symmetric encryption is also known as private-key encryption or secret-key encryption. It contains using the similar key for encryption and decryption. Encryption contains using an operation (an algorithm) to the data to be encrypted using the private key to create them meaningless.The main disadvantage of a secret-key cryptosystem is associated to the exchange of keys. Symmetric encryption depends on the swap of a secret (keys).Public-key cryptosystems − Public-key cryptosystems is also known as asymmetric cryptography. It is a type of cryptographic algorithms which needed two separate ...

Read More

What is the need of Authentication in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 1K+ Views

Authentication is the procedure of checking if a user or entity or device is who claims to be. In another terms, it is a set of verification and Identification. Authentication falls into three elements which are as follows −The knowledge factors − Something the user understand such as a password, pass phrase, or personal identification number (PIN), challenge response, design.The ownership factors − Something the user has wrist band, ID card, security token, cell phone with included hardware token, software token, or cell phone holding a software token.The inherence factors − Something the user is or does such as fingerprint, ...

Read More

What are the Authentication methods in Information Security?

Ginni
Ginni
Updated on 11-Mar-2022 654 Views

There are various method of Authentication which are as follows −Biometrics − Biometrics is a term that defines the measuring unique individual characteristics including the retina, the iris, fingerprints or even the face. Today, the concept is usually used by most people to define a method for protecting computers and saved data requiring a user to endure a scan of the body part used for identification.While several systems need a fingerprint or retinal scan as a user password, systems that are serious about security frequently need a password and a biometric scan before open the computer or device.There are some ...

Read More
Showing 121–130 of 292 articles
« Prev 1 11 12 13 14 15 30 Next »
Advertisements