Open In App

Types of Security Mechanism

Last Updated : 22 Apr, 2025
Comments
Improve
Suggest changes
Like Article
Like
Report

A security mechanism is a method or technology that protects data and systems from unauthorized access, attacks, and other threats. Security measures provide data integrity, confidentiality, and availability, thereby protecting sensitive information and maintaining trust in digital transactions. In this article, we will see types of security mechanisms.

What is Network Security?

Network Security is a field in computer technology that deals with ensuring the security of computer network infrastructure. The network is very necessary for sharing information whether it is at the hardware level such as printer, scanner, or at the software level. Therefore security mechanisms can also be termed as is set of processes that deal with recovery from security attacks. Various mechanisms are designed to recover from these specific attacks at various protocol layers.

Types of Security Mechanism

Types of Security Mechanism

  • Encipherment : This security mechanism deals with hiding and covering of data which helps data to become confidential. It is achieved by applying mathematical calculations or algorithms which reconstruct information into not readable form. It is achieved by two famous techniques named Cryptography and Encipherment. Level of data encryption is dependent on the algorithm used for encipherment.
  • Access Control : This mechanism is used to stop unattended access to data which you are sending. It can be achieved by various techniques such as applying passwords, using firewall, or just by adding PIN to data.
  • Notarization : This security mechanism involves use of trusted third party in communication. It acts as mediator between sender and receiver so that if any chance of conflict is reduced. This mediator keeps record of requests made by sender to receiver for later denied.
  • Data Integrity : This security mechanism is used by appending value to data to which is created by data itself. It is similar to sending packet of information known to both sending and receiving parties and checked before and after data is received. When this packet or data which is appended is checked and is the same while sending and receiving data integrity is maintained.
  • Authentication Exchange : This security mechanism deals with identity to be known in communication. This is achieved at the TCP/IP layer where two-way handshaking mechanism is used to ensure data is sent or not
  • Bit Stuffing : This security mechanism is used to add some extra bits into data which is being transmitted. It helps data to be checked at the receiving end and is achieved by Even parity or Odd Parity.
  • Digital Signature : This security mechanism is achieved by adding digital data that is not visible to eyes. It is form of electronic signature which is added by sender which is checked by receiver electronically. This mechanism is used to preserve data which is not more confidential but sender's identity is to be notified.

Conclusion

Security methods are critical for protecting data and network infrastructure from unauthorized access, attacks, and other threats. They protect data integrity, secrecy, and availability, hence preserving trust in digital transactions. Organizations can protect sensitive information and maintain secure network communication by using techniques such as encipherment, access control, notarization, and digital signatures.


Next Article

Similar Reads

  翻译: