Return to site

Types of Security Services

broken image

In information security service (ISS), the protection of information and communication is done between two or more organizations. The information is the transfer of information from one source to another during interactive processes like data migration, exchange of business process information, work collaboration, online transaction processing, application development, and supply chain management. These processes involve secure transmission of large volume of data over long distances. There are various types of ISS technologies deployed in these processes for example Information Service, Internet Security, Electronic Distribution, Enterprise Resource Planning (ERP) and Information Assurance.

Identification and authentication Security service are an intermediary layer of communication open distributed systems, that ensures proper security of all systems or of information transfers as decided by ITU-T. The different types of security services are: public key infrastructure (PKI), tokenization, password and smart card, and symmetric key technology (SHT). Public key infrastructure (PKI) refers to the hardware infrastructure that generates the digital certificates and public keys used in connection with electronic devices such as ATM machines, credit cards, and web terminals. The major benefit of using this type of mechanism is that it provides end-to-end security for the services while improving the level of usability. Another benefit is that it can be used for multiple purposes, for example as an authorization tool, digital proof of citizenship, and digital signature.

Distributed authentication Security services include the use of encryption, authentication and integrity measures. End-users perform a set of security functions, which include checking the integrity of the system software, checking for known access controls, and digitally signing the transmitted message. Different protocols are employed for performing these security services. Some of them include Digital Certificate, Digital Signature, Keratin Complex, Perfect Forward Secured Data Authentication (PSDSA), and URL spoofing. On the other hand, some of the most important security services include: response management, authorization, access control, and audit log reporting. The latter two services, response management and access control, are needed for preventing security threats, controlling access to critical resources, and auditing systems. Be sure to read more here!

Local application security services to provide authentication services within a local network or local area network (LAN). In many cases, these are used to establish secured communications within a company. They can also be used to provide authentication to data that travels between computers within a LAN or WAN. Some examples of such services include Digital Certificate, challenge-response authentication, HASH, and digital signature. Public Key Infrastructure (PKI) refers to the establishment of a secure connection to a key server.

Distributed Security Services involves a number of different security services that can be used to protect a network. The most important one is identity management. This is used to ensure that only people who need access to a particular account or resource to know about it. For example, in the workplace, the main article of business is security; all employees must know their password and be trained on how to use it.

There are several other types of security services. For more information about the various types, please see the main article. Each security mechanism is designed to block unauthorized access. Authorized users are granted access to a resource or service only when they have a valid, unexpired, and signed authorization code. With the advancement of technology, these methods of authentication service are continually being enhanced and improved. For more facts about security, visit this website at http://itlaw.wikia.com/wiki/Cybersecurity