The Challenges of Computer Security
Computer and network security is both fascinating and
complex. Some of the reasons include:
·
Security is not as simple as it might first
appear to the novice. The requirements seem to be straightforward; indeed, most
of the major requirements for security services can be given self-explanatory,
one-word labels: confidentiality, authentication, nonrepudiation, and integrity.
But the mechanisms used to meet those requirements can be quite complex, and
understanding them may involve rather subtle reasoning.
·
In developing a particular security mechanism or
algorithm, one must always consider potential attacks on those security
features. In many cases, successful attacks are designed by looking at the
problem in a completely different way, therefore exploiting an unexpected
weakness in the mechanism.
·
Because of point 2, the procedures used to provide
particular services are often counterintuitive. Typically, a security mechanism
is complex, and it is not obvious from the statement of a particular
requirement that such elaborate measures are needed. It is only when the
various aspects of the threat are considered that elaborate security mechanisms
make sense.
·
Having designed various security mechanisms, it
is necessary to decide where to use them. This is true both in terms of
physical placement (e.g., at what points in a network are certain security
mechanisms needed) and in a logical sense [e.g., at what layer or layers of an
architecture such as TCP/IP (Transmission Control Protocol/Internet Protocol)
should mechanisms be placed].
·
Security mechanisms typically involve more than
a particular algorithm or protocol. They also require that participants be in
possession of some secret information (e.g., an encryption key), which raises
questions about the creation, distribution, and protection of that secret
information. There also may be a reliance on communications protocols whose
behavior may complicate the task of developing the security mechanism. For
example, if the proper functioning of the security mechanism requires setting
time limits on the transit time of a message from sender to receiver, then any
protocol or network that introduces variable, unpredictable delays may render
such time limits meaningless.
·
Computer and network security is essentially a battle
of wits between a perpetrator who tries to find holes and the designer or
administrator who tries to close them. The great advantage that the attacker
has is that he or she need only find a single weakness, while the designer must
find and eliminate all weaknesses to achieve perfect security.
·
There is a natural tendency on the part of users
and system managers to perceive little benefit from security investment until a
security failure occurs.
·
Security requires regular, even constant, monitoring,
and this is difficult in today’s short-term, overloaded environment.
·
Security is still too often an afterthought to
be incorporated into a system after the design is complete rather than being an
integral part of the design process.
·
Many users (and even security administrators)
view strong security as an impediment to efficient and user-friendly operation
of an information system or use of information.
Lecture Reference:
W. Stallings, “Network Security Essentials: Applications and Standards, Fourth Edition.”
Safehandsecurity service is known for providing uncountable services all limited with the latest access systems and techniques. Our team are well skilled and are capable enough to meet all the challenges and serving you with best and reliable security. Our services include, security guards, door supervisors, event security and much more.
ReplyDeleteHire Security Guards | Security Guards Companies | Security Guards Services | Security Services Australia | Security Companies Australia | Event Security Services | Private Party Security | K9 Security Services | Mobile Patorls & Alarm Response Service | Crowd Control Services | Security Guards Agencies | Security Companies | Security Services
Good informationcustom software development
ReplyDelete