SlideShare a Scribd company logo
1 of 14
Download to read offline
By
Name: M.Nivedhini
Class: II Msc., Computer Science
Batch: 2017-2019
Incharge staff:Ms.M.Florence Dayana
BASTION HOST:
A bastion host is a gateway between an inside network and an ouside network.
It is designed to protect against attacks aimed at the inside network.
It is a system identified by the firewall administrator as a critical strong point
in the network security.
A bastion host is a specialized computer that is deliberately
exposed on a public network.
It sits between two networks (i.e)one is trusted and another one is untrusted.
Regulates traffic between those networks.
ACCESS CONTROL:
Access Control are the rules written out that determine whether
network access should be granted or rejected to specific IP addresses.
Access control identify the system user.
The basic elements of access control are:
Subject: An entity (typically a process) capable of accessing objects.
Object: Anything to which access is controlled.
Bell-La Padula (BLP) is a MAC policy for protecting secrets.
Bell-La padula Rules:
Simple Security Property: S can read O if l(S)≥l(O).
Star Property: S can write O if l(O)≥l(S).
Another widely applicable requirement is to protect data or resources on
the basis of levels of security is the trusted computer systems.
This is commonly found in millitary where information are classified as
unclassified (U)
 confidential (C)
secret (S)
 top secret (TS)
This is also known as multilevel security.
Common Criteria is a framework in which computer system users
can specify their security functional and assurance requirement.
The CC defines a common set of potential security
requirements for use in evaluation.
The term target of evaluation (TOE) refers to that part of the
product or system that is subject to evaluation.
Common Criteria specifies standards for
Evaluation Criteria.
Methodology for Application of Criteria.
Administrative Procedures for Evaluation.
 Certification and Accreditation Schemes.
COMMON CRITERIA REQUIREMENTS:
There are two requirements in Common Criteria:
Functional Requirements:
security audit
crypto support
communications
user data protection
identification & authentication
 security management
privacy
Protection
trusted path
Assurance Requirements:
configuration management
delivery & operation
Development
guidance document
life cycle support
PROTECTION PROFILES (PPs):
It define an implementation-independent reusable set of security
requirements and objectives for a category of products or systems.
 That meet similar consumer needs for IT security, reflecting user security
requirements.
 SECURITY TARGETS (STs):
It contain the IT security objectives and requirements of a specific
identified TOE.
Defines the functional and assurance measures offered by that TOE to meet
stated requirements, and forms the basis for an evaluation.
E content ns
E content ns

More Related Content

What's hot

Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network security
mmubashirkhan
 
Francis Bartozak Network Admin Resume
Francis Bartozak Network Admin ResumeFrancis Bartozak Network Admin Resume
Francis Bartozak Network Admin Resume
Francis Bartoszak
 
The Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured NetworkThe Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured Network
jeremywatkins57
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
Abiramis19
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
Sapna Kumari
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
FITSFSd
 

What's hot (20)

OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Web security
Web securityWeb security
Web security
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 
Distributed network security management
Distributed network security managementDistributed network security management
Distributed network security management
 
Situational awareness for computer network security
Situational awareness for computer network securitySituational awareness for computer network security
Situational awareness for computer network security
 
Francis Bartozak Network Admin Resume
Francis Bartozak Network Admin ResumeFrancis Bartozak Network Admin Resume
Francis Bartozak Network Admin Resume
 
The Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured NetworkThe Brooklyn Circus’ Secured Network
The Brooklyn Circus’ Secured Network
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for womenE content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
E content,S.Abirami,II-M.sc(computer Science),Bon Secours college for women
 
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCENETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
NETWORK SECURITY-K.GAYADRI-II-MSC COMPUTER SCIENCE
 
Data base security & integrity
Data base security &  integrityData base security &  integrity
Data base security & integrity
 
network security, group policy and firewalls
network security, group policy and firewallsnetwork security, group policy and firewalls
network security, group policy and firewalls
 
Data and database security and controls
Data and database security and controlsData and database security and controls
Data and database security and controls
 
Network srcurity
Network srcurityNetwork srcurity
Network srcurity
 
DB security
 DB security DB security
DB security
 
Ch01
Ch01Ch01
Ch01
 

Similar to E content ns

Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
C.U
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
ashu6
 
Access control3
Access control3Access control3
Access control3
Awhydot
 
Access control3
Access control3Access control3
Access control3
Awhydot
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 

Similar to E content ns (20)

Firewalls
FirewallsFirewalls
Firewalls
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
Is4560
Is4560Is4560
Is4560
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Internal security on an ids based on agents
Internal security on an ids based on agentsInternal security on an ids based on agents
Internal security on an ids based on agents
 
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTSINTERNAL SECURITY ON AN IDS BASED ON AGENTS
INTERNAL SECURITY ON AN IDS BASED ON AGENTS
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
OSCh19
OSCh19OSCh19
OSCh19
 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Security technologies
Security technologiesSecurity technologies
Security technologies
 
Security policy case study
Security policy case studySecurity policy case study
Security policy case study
 
Access control3
Access control3Access control3
Access control3
 
Access control3
Access control3Access control3
Access control3
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
Lecture 07 networking
Lecture 07 networkingLecture 07 networking
Lecture 07 networking
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Sapna ppt
Sapna pptSapna ppt
Sapna ppt
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

E content ns

  • 1. By Name: M.Nivedhini Class: II Msc., Computer Science Batch: 2017-2019 Incharge staff:Ms.M.Florence Dayana
  • 2.
  • 3.
  • 4. BASTION HOST: A bastion host is a gateway between an inside network and an ouside network. It is designed to protect against attacks aimed at the inside network. It is a system identified by the firewall administrator as a critical strong point in the network security. A bastion host is a specialized computer that is deliberately exposed on a public network. It sits between two networks (i.e)one is trusted and another one is untrusted. Regulates traffic between those networks.
  • 5.
  • 6. ACCESS CONTROL: Access Control are the rules written out that determine whether network access should be granted or rejected to specific IP addresses. Access control identify the system user. The basic elements of access control are: Subject: An entity (typically a process) capable of accessing objects. Object: Anything to which access is controlled.
  • 7. Bell-La Padula (BLP) is a MAC policy for protecting secrets. Bell-La padula Rules: Simple Security Property: S can read O if l(S)≥l(O). Star Property: S can write O if l(O)≥l(S).
  • 8. Another widely applicable requirement is to protect data or resources on the basis of levels of security is the trusted computer systems. This is commonly found in millitary where information are classified as unclassified (U)  confidential (C) secret (S)  top secret (TS) This is also known as multilevel security.
  • 9. Common Criteria is a framework in which computer system users can specify their security functional and assurance requirement. The CC defines a common set of potential security requirements for use in evaluation. The term target of evaluation (TOE) refers to that part of the product or system that is subject to evaluation. Common Criteria specifies standards for Evaluation Criteria. Methodology for Application of Criteria. Administrative Procedures for Evaluation.  Certification and Accreditation Schemes.
  • 10. COMMON CRITERIA REQUIREMENTS: There are two requirements in Common Criteria: Functional Requirements: security audit crypto support communications user data protection identification & authentication  security management privacy Protection trusted path Assurance Requirements: configuration management delivery & operation Development guidance document life cycle support
  • 11.
  • 12. PROTECTION PROFILES (PPs): It define an implementation-independent reusable set of security requirements and objectives for a category of products or systems.  That meet similar consumer needs for IT security, reflecting user security requirements.  SECURITY TARGETS (STs): It contain the IT security objectives and requirements of a specific identified TOE. Defines the functional and assurance measures offered by that TOE to meet stated requirements, and forms the basis for an evaluation.