UNIT - IV

I/O Management

I/O hardware, buffering, disk I/O, RAID, disk cache.

File Management

File Management system, File Accessing Methods, File Directories, File Allocation Methods, File Space Management, Disk Space Management, Record blocking.

Protection Mechanisms

Cryptography

Cryptography is a complex field that involves techniques to secure communication and protect data privacy. It's essential for secure online transactions, data storage, and more.

Key Concepts

At its core, cryptography relies on two main concepts:

Encryption

Encryption is the process of converting readable data (plaintext) into an unreadable form (ciphertext). This is done using a mathematical algorithm and a cryptographic key. The key acts like a password and determines how the data is transformed.

Decryption

Decryption is the reverse process of encryption. It involves converting ciphertext back into plaintext using the same algorithm and the correct key. Only those with the correct key can successfully decrypt the data.

Types of Cryptography:

There are various types of cryptography such as

Symmetric Cryptography

In symmetric cryptography, the same key is used for both encryption and decryption. This simplicity comes with a challenge – securely sharing the key between parties without exposing it to attackers.

Asymmetric Cryptography

Asymmetric cryptography uses a pair of keys: a public key for encryption and a private key for decryption. Data encrypted with the public key can only be decrypted with the corresponding private key, providing a more secure way to share encrypted information.

Applications

Cryptography finds applications in various areas:

Secure Communication

It ensures that messages exchanged between parties remain confidential and tamper-proof. For example, HTTPS protocols secure data transmission over the internet.

Data Integrity

Cryptography can detect if data has been altered during transmission. Hash functions are used to generate fixed-size values (hashes) that uniquely represent data.

Authentication

Cryptography helps verify the identity of users or systems. Digital signatures use asymmetric cryptography to provide authenticity and integrity to messages.

Privacy

Encryption safeguards sensitive information stored on devices or in the cloud, preventing unauthorized access even if the data is compromised.


Digital Signatures

Digital signatures are akin to your online handwritten signature, providing authenticity and integrity to digital documents.

How It Works:

  1. Signing: A sender uses their private key to create a unique digital signature for a document.
  2. Verification: The recipient uses the sender's public key to verify the signature.

Key Points:

  • Authentication: A digital signature confirms the sender's identity.
  • Integrity: It ensures that the document hasn't been tampered with.
  • Non-Repudiation: The sender can't deny sending the document once they've signed it.

Process:

  1. Hashing: The document's content is hashed to create a unique fixed-size value.
  2. Signing: The hash is encrypted with the sender's private key, forming the digital signature.
  3. Verification: The recipient decrypts the signature with the sender's public key and compares hashes.

Applications:

  • Contracts: Ensuring the validity of digital agreements.
  • Emails: Verifying the authenticity of emails and attachments.
  • Software: Confirming that software updates are from legitimate sources.

User Authentication

User authentication is the process of confirming a user's identity to provide access to secure systems or resources.

Importance of User Authentication:

  • Security: Prevents unauthorized access to sensitive information.
  • Privacy: Protects user data from being accessed by others.
  • Accountability: Links actions to specific individuals.

Common Authentication Factors:

  1. Something You Know: Passwords, PINs, security questions.
  2. Something You Have: Smart cards, hardware tokens, mobile devices.
  3. Something You Are: Biometrics like fingerprints, facial recognition.

Authentication Process:

  1. Initiation: User attempts to access a system or resource.
  2. Submission: User provides authentication credentials.
  3. Validation: Credentials are verified against stored data.
  4. Access: User gains authorized access if validation is successful.

Multi-Factor Authentication (MFA):

MFA combines two or more authentication factors to enhance security.

Applications:

  • Online Accounts: Protects email, social media, and financial accounts.
  • Corporate Networks: Ensures authorized access to company resources.
  • Mobile Devices: Safeguards personal data and apps.
As of Now, This website only supports screens which are below 1024px, Please bear with itβœ¨πŸ™‚

Help and support

Did this doc help you?

Help us make these docs great!

All these documentations are open source. See something that's wrong or unclear? Submit a pull request.

Learn how to contribute

Still need help? Ask the GitHub community

Contact support @Chetan Raut