SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Downloaden Sie, um offline zu lesen
NETWORK SECURITY
1/1/2010 1
Presented By,
Name: S.Karthika.
CLASS: II-M.Sc.,Computer Science.
BATCH:2017-2019.
Incharge staf: ms.m.florance dayana.
COMPUTER SECURITY - also known as cyber
security or IT security, is the protection
of computer systems from the theft or damage to their
hardware, software or information, as well as from
disruption or misdirection of the services they provide.
NETWORK SECURITY - measures to protect data
during their transmission.
INTERNET SECURITY - Measures to protect data
during their transmission over a collection of
interconnected networks which consists of measures
to deter, prevent, detect, and correct security
violations that involve the transmission & storage of
information.
INTEGRITY
CONFIDENTIALITY
AVAILABILITY
1.CONFIDENTIALITY
• Confidentiality refers to protecting information from
being accessed by unauthorized parties. In other
words, only the people who are authorized to do
so can gain access to sensitive data.
• Imagine your bank records. You should be able to
access them, of course, and employees at the bank
who are helping you with a transaction should be
able to access them, but no one else should.
2. INTEGRITY
• The second goal of Network Security is "Integrity".
Integrity aims at maintaining and assuring the accuracy
and consistency of data.
• The function of Integrity is to make sure that the data
is accurate and reliable and is not changed by
unauthorized persons or hackers.
• The data received by the recipient must be exactly
same as the data sent from the sender, without change
in even single bit of data.
• cryptography plays a very major role
in ensuring data integrity.
3.AVAILABILITY
Availability: The third goal of network security is
"Availability".
Availability of information refers to ensuring that
authorized parties are able to access the information when
needed.
Information only has value if the right people can access it
at the right times. Denying access to information has
become a very common attack nowadays.
How does one ensure data availability? Backup is key.
Regularly doing off-site backups can limit the damage
caused by damage to hard drives or natural disasters.
LEVELS OF IMPACT
 We can define 3 levels of impact from a security
breach
Low
Moderate
High
LOW IMPACT
 The loss could be expected to have a limited adverse effect
on organizational operations, organizational assets, or
individuals.
 The loss of confidentiality, integrity, or availability might
 (i) minor damage to organizational assets;
 (ii) minor financial loss; or
 (iii) minor harm to individuals.
MODERATE IMPACT
 The loss could be expected to have a serious adverse effect on
organizational operations, organizational assets, or individuals.
 A serious adverse effect means that, for example, the loss might
 (i) the functions is significantly reduced;
 (ii) result in significant damage to organizational assets;
 (iii) result in significant financial loss; or
 (iv) result in significant harm to individuals that does not
involve loss of life or serious, life-threatening injuries.
HIGH IMPACT
 The loss could be expected to have a severe or catastrophic
adverse effect on organizational operations, organizational
assets, or individuals.
 A severe or catastrophic adverse effect means that, for
example, the loss might
 (i) cause a severe degradation
 (ii) result in major damage to organizational assets;
 (iii) result in major financial loss; or
 (iv) result in severe or catastrophic harm to individuals
involving loss of life or serious life threatening injuries.
CHALLENGES OF COMPUTER SECURITY
1. Computer security is not simple
2. One must consider potential (unexpected) attacks
3. Procedures used are often counter-intuitive
4. Must decide where to deploy mechanisms
5. Involve algorithms and secret info (keys)
6. A battle of wits between attacker / admin
7. It is not perceived on benefit until fails
8. Requires constant monitoring
9. Too often an after-thought (not integral)
10. Regarded as impediment to using system
ASPECTS OF SECURITY
The 3 aspects of information security:
Security Attack
Security Mechanism
Security Service
Security attack:Any action that compromises the security of
information owned by an organization.
• Security mechanism:A process (or a device) that is designed to
detect, prevent, or recover from a security attack.
• Security service:A processing or communication service that
enhances the security of the data processing systems and the
information transfers of an organization.
 Attack - An assault on system security that derives from an intelligent
threat; that is, an intelligent act that is a deliberate attempt (especially in
the sense of a method or technique) to evade security services and
violate the security policy of a system.There are two types of attacks.
 1. Passive Attack 2.Active Attack
HANDLING ATTACKS
Passive attacks – A passive attack
attempts to learn or make use of
information from the system but does not
affect system resources.
Passive attacks are in the nature of
eavesdropping on, or monitoring of,
transmissions.
These attacks are difficult to detect
because they do not involve any alteration
of the data.
PASSIVE ATTACK - INTERCEPTION
release of message contents
PASSIVE ATTACK:TRAFFIC ANALYSIS
Observe traffic pattern
Traffic analysis - monitor traffic flow to determine location
and identity of communicating hosts and could observe the
frequency and length of messages being exchanged
Active Attack
Active attacks involve some modification of the
data stream or the creation of a false stream
It can be subdivided into four categories: masquerade,
replay, modification of messages, and denial of service:
• Masquerade of one entity as some other
• Replay previous messages
• Modify/alter (part of) messages in transit to produce
an unauthorized effect
• Denial of service - prevents or inhibits the normal
use or management of communications facilities
ACTIVE ATTACK: INTERRUPTION
Block delivery of message
ACTIVE ATTACK: FABRICATION
Fabricate message
ACTIVE ATTACK: REPLAY
ACTIVE ATTACK: MODIFICATION
Modify message
MODEL FOR NETWORK SECURITY
This general model shows that there are four basic tasks in designing a particular security service.
1. Design a suitable algorithm for the security
transformation
2. Generate the secret information (keys) used by
the algorithm
3. Develop methods to distribute and share the
secret information
4. Specify a protocol enabling the principles to use the
transformation and secret information for a security
service
MODEL FOR NETWORK ACCESS
SECURITY
using this model requires us to:
1. select appropriate gatekeeper functions to
identify users
2. implement security controls to ensure only
authorised users access designated information
or resources
Network security-S.Karthika II-M.Sc computer science,Bon Securous college for women

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
Ana Meskovska
 

Was ist angesagt? (20)

Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack Chapter 4 vulnerability threat and attack
Chapter 4 vulnerability threat and attack
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Information security
Information securityInformation security
Information security
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
Information security
Information securityInformation security
Information security
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
06. security concept
06. security concept06. security concept
06. security concept
 
2 Security And Internet Security
2 Security And Internet Security2 Security And Internet Security
2 Security And Internet Security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 

Ähnlich wie Network security-S.Karthika II-M.Sc computer science,Bon Securous college for women

ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
Shanmuganathan C
 

Ähnlich wie Network security-S.Karthika II-M.Sc computer science,Bon Securous college for women (20)

Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Information security
Information securityInformation security
Information security
 
Cyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .pptCyber Crime and Security Ch 1 .ppt
Cyber Crime and Security Ch 1 .ppt
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network security
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Website security
Website securityWebsite security
Website security
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
 
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptxCS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
CS PPT CHP 1 PART 1-Types of attacks and basics of computer security.pptx
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overview_nemo (1)ch01_overvi...
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
 
ch01_overview.ppt
ch01_overview.pptch01_overview.ppt
ch01_overview.ppt
 
Ch01 overview nemo
Ch01 overview nemoCh01 overview nemo
Ch01 overview nemo
 
ch01_overview_nemo.ppt
ch01_overview_nemo.pptch01_overview_nemo.ppt
ch01_overview_nemo.ppt
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Kürzlich hochgeladen (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

Network security-S.Karthika II-M.Sc computer science,Bon Securous college for women

  • 1. NETWORK SECURITY 1/1/2010 1 Presented By, Name: S.Karthika. CLASS: II-M.Sc.,Computer Science. BATCH:2017-2019. Incharge staf: ms.m.florance dayana.
  • 2. COMPUTER SECURITY - also known as cyber security or IT security, is the protection of computer systems from the theft or damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. NETWORK SECURITY - measures to protect data during their transmission.
  • 3. INTERNET SECURITY - Measures to protect data during their transmission over a collection of interconnected networks which consists of measures to deter, prevent, detect, and correct security violations that involve the transmission & storage of information.
  • 5. 1.CONFIDENTIALITY • Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. • Imagine your bank records. You should be able to access them, of course, and employees at the bank who are helping you with a transaction should be able to access them, but no one else should.
  • 6. 2. INTEGRITY • The second goal of Network Security is "Integrity". Integrity aims at maintaining and assuring the accuracy and consistency of data. • The function of Integrity is to make sure that the data is accurate and reliable and is not changed by unauthorized persons or hackers.
  • 7. • The data received by the recipient must be exactly same as the data sent from the sender, without change in even single bit of data. • cryptography plays a very major role in ensuring data integrity.
  • 8. 3.AVAILABILITY Availability: The third goal of network security is "Availability". Availability of information refers to ensuring that authorized parties are able to access the information when needed. Information only has value if the right people can access it at the right times. Denying access to information has become a very common attack nowadays. How does one ensure data availability? Backup is key. Regularly doing off-site backups can limit the damage caused by damage to hard drives or natural disasters.
  • 9. LEVELS OF IMPACT  We can define 3 levels of impact from a security breach Low Moderate High
  • 10. LOW IMPACT  The loss could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals.  The loss of confidentiality, integrity, or availability might  (i) minor damage to organizational assets;  (ii) minor financial loss; or  (iii) minor harm to individuals.
  • 11. MODERATE IMPACT  The loss could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals.  A serious adverse effect means that, for example, the loss might  (i) the functions is significantly reduced;  (ii) result in significant damage to organizational assets;  (iii) result in significant financial loss; or  (iv) result in significant harm to individuals that does not involve loss of life or serious, life-threatening injuries.
  • 12. HIGH IMPACT  The loss could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.  A severe or catastrophic adverse effect means that, for example, the loss might  (i) cause a severe degradation  (ii) result in major damage to organizational assets;  (iii) result in major financial loss; or  (iv) result in severe or catastrophic harm to individuals involving loss of life or serious life threatening injuries.
  • 13. CHALLENGES OF COMPUTER SECURITY 1. Computer security is not simple 2. One must consider potential (unexpected) attacks 3. Procedures used are often counter-intuitive 4. Must decide where to deploy mechanisms 5. Involve algorithms and secret info (keys) 6. A battle of wits between attacker / admin 7. It is not perceived on benefit until fails 8. Requires constant monitoring 9. Too often an after-thought (not integral) 10. Regarded as impediment to using system
  • 14. ASPECTS OF SECURITY The 3 aspects of information security: Security Attack Security Mechanism Security Service Security attack:Any action that compromises the security of information owned by an organization. • Security mechanism:A process (or a device) that is designed to detect, prevent, or recover from a security attack. • Security service:A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization.
  • 15.  Attack - An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.There are two types of attacks.  1. Passive Attack 2.Active Attack
  • 16. HANDLING ATTACKS Passive attacks – A passive attack attempts to learn or make use of information from the system but does not affect system resources. Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. These attacks are difficult to detect because they do not involve any alteration of the data.
  • 17. PASSIVE ATTACK - INTERCEPTION release of message contents
  • 18. PASSIVE ATTACK:TRAFFIC ANALYSIS Observe traffic pattern Traffic analysis - monitor traffic flow to determine location and identity of communicating hosts and could observe the frequency and length of messages being exchanged
  • 19. Active Attack Active attacks involve some modification of the data stream or the creation of a false stream It can be subdivided into four categories: masquerade, replay, modification of messages, and denial of service: • Masquerade of one entity as some other • Replay previous messages • Modify/alter (part of) messages in transit to produce an unauthorized effect • Denial of service - prevents or inhibits the normal use or management of communications facilities
  • 20. ACTIVE ATTACK: INTERRUPTION Block delivery of message
  • 24. MODEL FOR NETWORK SECURITY This general model shows that there are four basic tasks in designing a particular security service. 1. Design a suitable algorithm for the security transformation 2. Generate the secret information (keys) used by the algorithm 3. Develop methods to distribute and share the secret information 4. Specify a protocol enabling the principles to use the transformation and secret information for a security service
  • 25. MODEL FOR NETWORK ACCESS SECURITY using this model requires us to: 1. select appropriate gatekeeper functions to identify users 2. implement security controls to ensure only authorised users access designated information or resources