Sie sind auf Seite 1von 5

Name: Abdisalan abdulkadir mohamed

Email: engccmjayte@gmail.com

Lecturer: eng ahmedzarif

Course: network defense system

Assignment: 1 ( my words)

Date: 20/06/2020

1|Page
Q1 Explaining types of Access controls
Access control is the process of allowing or denying the user to use some specific programs and
tells us who can enter the system and use some specific resources using some policies and access
control is the most important part in security and also protecting the devices such as
communication and network devices because it can protect what we need to be protected. An
identification is the best example of access controls and also the basic part of all access controls.
Access controls consists of three types
1) Administrative access controls
2) Physical access controls
3) And technical access controls
Administrative access controls use policies, responsibilities, laws, ideas and other administrative
functions to protect and control the system. Authentication, identification and authorization use
some policies to protect the systems.
Physical access controls use special techniques to manage and control the physical environment
and limit the contact with devices, some of the following are examples of physical access
controls;
a) Cameras that is used for recording videos
b) Sensors that is used for detection such as motion detection, fire detection, and also smoke
detection
c) Guards and also restricted areas
Technical access controls use hardware and software and technology restrictions to know the
limitation of accessing data on the system. Some techniques are as follows
a) Encryption of data
b) Using biometrics such lock screen, fingerprinting, face recognition.
c) Access control lists is one of the technical controls and also observing network
congestions.
And also the three main models of access controls
1) Discretionary Access Control
2) Mandatory Access Control
3) Role Based Access Control
Discretionary Access Control allows the owner to create and change some of the resources or to
specify and give permissions who can create and change from the resources, this flexible one that
we use in operating systems
Mandatory Access Control uses strict rules and security so the user has no choice to set any
controls and it’s the opposite of discretionary access control.

2|Page
Role Based Access Control uses some of administered set of controls it assigns the user
according to his function in the company. If you are a director or team leader only assigns your
function.

Q2 Explaining types of Encryption


Encryption is the process of converting or encoding the information or any other data into a form
that only authorized people can understand and read it. It also converts original message or
information that is called (plain text) into secret way that most people cannot understand that is
called cipher text.
For example:
Plain text (original form) Cipher text (unreadable form)

Ahmed @binbe

Farah Hbobi

There are types of encryption:


1) Symmetric encryption
2) Asymmetric encryption
Symmetric encryption: uses the encoding (encryption) and decoding (decryption) for the same
key. The two keys are identical for both encoding of plain text and decoding of cipher text and
share information between two or more people in private link
It has many advantages and disadvantages but The main disadvantage of symmetrical encryption
is that two parties those are sharing information can see the secret key.
For example:

Plain text encryption same key decryption cipher text


Same keys

3|Page
Advantage of symmetric encryption Disadvantage of symmetric encryption

Its reliable for the security of information Needs maintaining

You can encrypt as much as you Sometimes high expensive.

Asymmetric encryption uses a key for encryption and another key for decryption so it’s known
as public private key. Public key is used for encrypting data and private key is used for
decrypting the data
Any message or information that is encrypted by using private key it must be decrypted by using
matched public key and share information without seen their secret key.
For example:

Original information Public key for cipher text Private key for
encryption decryption

The main disadvantage of asymmetric of asymmetric encryption is that it needs long time to
compute the content of the information.

Symmetric and asymmetric comparison


Although symmetric encryption is fast and it’s not safe as asymmetric encryption because its key
can be stolen and decode the information because it has one key.

4|Page
Q3 explaining of cryptography and firewalls

A) Cryptography came from two words which means secret writing and it’s an art that
is used to encrypt the information and messages to make them difficult way to
interpret easily.
Cryptography is most important part in security and consists two processes:
a) Encryption
b) Decryption

Plain text Cryptography


cipher text

There are two main types of cryptography:


a) Symmetric cryptography
b) Asymmetric cryptography
And it’s the same way of symmetric encryption and asymmetric encryption.

B) Firewalls is a network security that is used to prevent some authorized users to access
the network and it can be used hardware software and both of them.
It’s used as a boundary between outside network and internal network called intranet.
It consists of three main types:
a) Packet filter
b) Application level
c) Circuit level

Thanks
Abdisalan abdulkadir Mohamed. My own words

5|Page

Das könnte Ihnen auch gefallen