Security terminologies n principals


The different security principles and there terminology are as below :

1. Confidentiality: The confidentiality principle means that only the sender and the intended recipient should be able to access the message. Confidentiality is not achieved if an unauthorized person is able to access a message.

2. Authentication: The authentication principle help to establish proof of identities. The authentication process makes sure sure that the sender of a electronic message or document is correctly identified.

3. Integrity: The integrity principle protects data against active threats like those that may alter it.

4. Non-repudation: The principle of non-repudation prevents either sender or receiver from denying a transmitted message. Therefore, whenever a message is send by the sender, the receiver can prove that the message was sent by that the sender. When a message is received, the sender can prove that the message was received by the receiver.

5. Access control: The principle of access control means the ability to limit and control the access to host systems and applications through communication links. To achieve this, a user attempting to access must first be identified, or authenticated.

6. Availability: The principle of availability means that system resources must be available to authorized entities at all times.

More topics from NWS to read:

NETWORK & WEB SECURITY covered following topics in NWS.
Python Programming ↓ 👆
Java Programming ↓ 👆
JAVA covered following topics in these notes.
JAVA Programs
Principles of Programming Languages ↓ 👆
Principles of Programming Languages covered following topics in these notes.

Previous years solved papers:
A list of Video lectures References:
  1. Sebesta,”Concept of programming Language”, Pearson Edu 
  2. Louden, “Programming Languages: Principles & Practices” , Cengage Learning 
  3. Tucker, “Programming Languages: Principles and paradigms “, Tata McGraw –Hill. 
  4. E Horowitz, "Programming Languages", 2nd Edition, Addison Wesley

    Computer Organization and Architecture ↓ 👆

    Computer Organization and Architecture covered following topics in these notes.

    1. Structure of desktop computers
    2. Logic gates
    3. Register organization
    4. Bus structure
    5. Addressing modes
    6. Register transfer language
    7. Direct mapping numericals
    8. Register in Assembly Language Programming
    9. Arrays in Assembly Language Programming


    1. William stalling ,“Computer Architecture and Organization” PHI
    2. Morris Mano , “Computer System Organization ”PHI

    Computer Network ↓ 👆
    Computer Network covered following topics in these notes.
    1. Data Link Layer
    2. Framing
    3. Byte count framing method
    4. Flag bytes with byte stuffing framing method
    5. Flag bits with bit stuffing framing method
    6. Physical layer coding violations framing method
    7. Error control in data link layer
    8. Stop and Wait scheme
    9. Sliding Window Protocol
    10. One bit sliding window protocol
    11. A protocol Using Go-Back-N
    12. Selective repeat protocol
    13. Application layer
    1. Andrew S. Tanenbaum, David J. Wetherall, “Computer Networks” Pearson Education.
    2. Douglas E Comer, “Internetworking with TCP/IP Principles, Protocols, And Architecture",Pearson Education
    3. KavehPahlavan, Prashant Krishnamurthy, “Networking Fundamentals”, Wiley Publication.
    4. Ying-Dar Lin, Ren-Hung Hwang, Fred Baker, “Computer Networks: An Open Source Approach”, McGraw Hill.